River Security

Welcome Simen Bai!

Join us in welcoming our future rockstar, Simen Bai to the position as Security Researcher! Throughout interview-rounds and his participation in our hacker-house event early this fall, we have gotten...
Read More about Welcome Simen Bai!

Part 2 – Acquiring Talent in Information Security

This is a continuation of Part 1 - Acquiring Talent In Information Security. A Penetration Testing Wizard is assessing a new prospect Assessing New Prospects  Being able to discern the...
Read More about Part 2 – Acquiring Talent in Information Security

Part 1 – Acquiring Talent In Information Security

Hiring Great Fantastic Penetration Testers What does it take to become a successful penetration tester? How do you identify, hire and stimulate your staff? Did you know, some of the...
Read More about Part 1 – Acquiring Talent In Information Security

Karina Årland – Account Executive – Welcome!

We are incredibly happy to announce our latest member to the team, Karina Årland, joining us from Beerenberg! We welcome her to the position as Account Executive. The continuous growth...
Read More about Karina Årland – Account Executive – Welcome!

Incident Response – Practicing and Gamification

I recently published a video on YouTube on the aspect of practicing Incident Response scenarios, applying elements of gamification and planning out how we can plan to prepare against dealing...
Read More about Incident Response – Practicing and Gamification

Happy Birthday to River Security

At the time of writing, River Security has turned one year old and looking back, we realize what a fantastic year it has been! As most one-year-olds are busy learning...
Read More about Happy Birthday to River Security

OODA Loops, Speed and Agility

To beat attackers at their own game, it is imperative River Security is able to more rapidly detect, uncover and find flaws in our customers environments than the threat actors....
Read More about OODA Loops, Speed and Agility

Know Your Enemy

River Security follow closely the attackers' behaviors and attack techniques. In studying attackers Tactics, Techniques and Procedures (TTP's), our tools are sharpened and tailored to discover weaknesses in organizations defenses...
Read More about Know Your Enemy

New employee!

The current threat landscape, where the number of cyberattacks are rapidly increasing, sets requirements for cybersecurity companies to always be on the constant lookout for more skilled talent in this...
Read More about New employee!

Ransomware Roulette – Level up or pay up

As we all know, at least to some extent, cryptocurrency solved the main problem (if we ask threat actors, that is) in ransomware and extortion attacks – getting away with...
Read More about Ransomware Roulette – Level up or pay up