ThingsRecon obtains Cybersecurity Made in Europe label. Read CEO’s view.
See which suppliers put you at risk. Request free proximity scan.
Uncover exposed assets across your digital footprint. Enrich findings with business, financial, and geopolitical context to prioritize the risks.
Understand how vendors connect to your digital ecosystem. Continuously monitor supplier exposure and focus on the risks closest to your core systems.
Connect exposure intelligence across your stack.
blog
Fresh insights and real-world lessons on the things that matters.
Explainers, demos, and bite-sized takes on cyber risk straight from our team.
Clear breakdowns of our capabilities and use cases.
Real outcomes in security, from compliance to exposure.
press release
The things you need for a better recon. Explore fresh perspectives and practical lessons on attack surface discovery, third-party risk, and the things most teams overlook.
Compliance & Regulations
EU Cybersecurity Package 2026: What Supply Chain Security Compliance Requires
NIS2 and Supply Chain Security: What Actual Compliance Looks Like
How does Digital Proximity map to NIS2 asset identification?
Datasheets
Datasheet
How ThingsRecon Capabilities Support DORA Compliance
Supply Chain Intelligence
Attack Surface Deep Discovery
Videos
Video
800,000 Vulnerabilities Later: What Security Teams Still Miss About Risk
All Things Cyber: Building The Security Tool We Wished We Had
What Powers Our Recon (And Why It Works)