Risk is Risk and Risk is Contextual
DarcSight’s thoughts on risk, third-party risk, grades, and beyond.
SaaS Discovery Unlike Any Other: SaaSqwatch
ThreatNG’s unique approach to SaaS discovery empowers you to get an inventory of your SaaS applications and overall digital presence for digital risk and external attack surface management.
Third-Party Risk Questionnaires and Security Risk Ratings
Our Solution to Empower Organizations to Address What is Relevant and within their Control.
DarcRadar: Cyber Risk Appetite Definition & Scoring
With DarcRadar we empower you to define and measure cyber risk in the context of “your” risk appetite and compare it against industry standards, best practices, and hygiene to address the specific parts of the Attack Surface and Digital Footprint that pose the most risk.
Functional Assets & Pillars
Securing and monitoring digital presence can overwhelming. Once people dig into their digital presence across the dark, deep, and open web, they see how enormous it is and feel lost, hopeless, and ultimately give up on the whole effort. If they do take action, we have seen people employ a whack-a-mole style approach that can be costly and ineffective.
ThreatNG Threat and Risk Analysis [TaR]
A new cost-effective approach to digital risk and attack surface management. Your organization spent a chunk of the operating budget on siloed solutions for addressing security and risk across multiple departments but still has to dedicate many hours (if not weeks) to develop a clear picture of your threat and risk posture. Here’s why:
What is the Technical Attack Surface?
The Technical Attack Surface (currently popularized as the External Attack Surface) references all publicly available data that is revelatory about an organization's IT infrastructure, services, and applications.
What is the Business Attack Surface?
With the Technical Attack Surface being connected to vulnerabilities and misconfigurations of applications and IT infrastructure, the Business Attack Surface encompasses everything that is revelatory about the inner workings of an organization.
OSINT Top Ten: Number 1 - Domain Information
Coming in at number one of our OSINT Top Ten is Domain Information which includes all Domains, Subdomains, Certificates, Emails, and Permutations/Look-Alikes (Company Names, Domains, and Emails).
OSINT Top Ten: Number 2 - Social Media
It is essential to monitor what is broadcasted on social media for compliant branding, instances of malicious/negative sentiment, and for the appropriate level of information sharing.
OSINT Top Ten: Number 3 - Sensitive Code Exposure
Online code repositories such as GitHub have grown to become standard solutions for version control and source code management. These solutions have proven to be easy-to-use but also prone to misconfigurations leading to the exposure of sensitive information (specifically sensitive code).
OSINT Top Ten: Number 4 - Search Engine Exploitation
Today we'll be talking about robots and dorks because at Number Four of the Open Source Intelligence Top Ten (aka OSINT Top Ten) is Search Engine Exploitation.
OSINT Top Ten: Number 5 - Cloud Exposure
It is important to examine “The Cloud” (especially vendor offerings like Amazon AWS, Google Cloud Platform, and Microsoft Azure) for anything that can be linked directly to your organization, brand, and offerings: key individuals, locations, domains, products, services, and project names.
OSINT Top Ten: Number 6 - Online Text Sharing Repositories
More commonly known as "paste sites," these online sharing repositories make it easy to share text from anywhere to anyone.
OSINT Top Ten: Number 7 - Sentiment and Financials
Monitoring and managing how your organization is presented online and perceived in public digital spaces is an integral part of threat management.
OSINT Top Ten: Number 8 - Archived Web Pages
Mismanagement or turning a blind eye to this vital part of an organization's digital presence can lead to brand damage, data leaks, or even possible persistent/ongoing attacks against existing live assets.
OSINT Top Ten: Number 9 - Dark Web
Is it true that one can only find dark Elves on the dark web? False, the dark elves we've seen are only in the Marvel Cinematic Universe. But there is information on the dark web that does not exist anywhere else.
OSINT Top Ten: Number 10 - Technology Stack
Your technology stack can give away more than you would think. From this alone, anyone can gain knowledge and insight into the inner workings of your organization.
OSINT Top 10
The results from our poll of open source intelligence (OSINT) sources are in, and we have our top ten. Check it out!
OSINT Poll
The list of “intelligence” to collect, analyze, assess, report, and monitor is vast with never ending possibilities of disciplines and categories. With so much “out there”, we want to take a poll and ask, “What are the most important sources of information that you use to investigate and manage the risk posture of your organization?”