solutions

Attack Surface
Deep Discovery

Uncover exposed assets across your digital footprint, from forgotten subdomains to misconfigured cloud services. Gain visibility and context to prioritize remediation.

Supply Chain
Risk Management

Discover how your vendors connect to your digital environment. Continuously monitor supplier exposure and understand which relationships introduce the greatest cyber risk.

Featured content

blog

A Security Leader's Guide to Digital Proximity & Prioritization

blog

Why Digital Connectivity Is Key to External Attack Surface Management
about ustestimonialspricing
resources
Blog

Fresh insights and real-world lessons
on the things that matters.

Videos

Explainers, demos, and bite-sized takes
on cyber risk straight from our team.

Visit Resource Center
Datasheets

Clear breakdowns of our capabilities
and use cases.

Use Cases

Real outcomes in security,
from compliance to exposure.

Visit Resource Center

Featured content

blog

10 Metrics to Track Exposure & Supply-Chain Risk

press release

Study: Enterprises Face Over 800,000 High-Severity Issues
start recon
start recon

ThingsRecon Blog

Fresh insights and real-world lessons on attack surface, third-party risk, and the things that matter.

Latest Articles

Expert Insights

Cookie Security: The Overlooked Threat to Cyber Hygiene

Cookies are small files websites store in your browser to remember identity, activity, and access—powerful markers of who you are online.

Stephane Konarkowski

October 29, 2025

Supply Chain Risk Management

Beyond CVSS: Introducing Digital Proximity™ for Smarter Risk Models

This security metric adds context to vulnerability management by showing how close each exposure sits to critical systems, data, and suppliers.

Stephane Konarkowski

October 22, 2025

Supply Chain Risk Management

Shadow IT on Campus: How Hidden Risk is Undermining Education Cybersecurity

Education’s reliance on SaaS and vendors expands attack surfaces—finding hidden assets and supply chain risks is key to reducing breach risk.

Tim Grieveson

October 15, 2025

October 14, 2025

Supply Chain Risk Management

Digital Twins, Real Threats: Securing the Manufacturing Supply Chain

Manufacturers are leaking risk through forgotten IIoT devices, orphaned APIs, and vendor blind spots. Here’s how to close those gaps.

Tim Grieveson

October 8, 2025

October 14, 2025

We're just
a message away

get in touch
Platform
attack surface deep discovery
supply chain risk management
contact us
about us
Learn
the recon log
all things cyber
academy

©ThingsRecon 2025.

Amsterdam, The Netherlands

Privacy Policy

Cookie Policy

Terms of Use

Contact us