solutions

Attack Surface
Deep Discovery

Uncover exposed assets across your digital footprint, from forgotten subdomains to misconfigured cloud services. Gain visibility and context to prioritize remediation.

Supply Chain
Risk Management

Discover how your vendors connect to your digital environment. Continuously monitor supplier exposure and understand which relationships introduce the greatest cyber risk.

Featured content

blog

A Security Leader's Guide to Digital Proximity & Prioritization

blog

Why Digital Connectivity Is Key to External Attack Surface Management
about ustestimonialspricing
resources
Blog

Fresh insights and real-world lessons
on the things that matters.

Videos

Explainers, demos, and bite-sized takes
on cyber risk straight from our team.

Visit Resource Center
Datasheets

Clear breakdowns of our capabilities
and use cases.

Use Cases

Real outcomes in security,
from compliance to exposure.

Visit Resource Center

Featured content

blog

10 Metrics to Track Exposure & Supply-Chain Risk

press release

Study: Enterprises Face Over 800,000 High-Severity Issues
start recon
start recon

Resource Center

The things you need for a better recon. Explore fresh perspectives and practical lessons on attack surface discovery, third-party risk, and the things most teams overlook.

Blog

Supply Chain Risk Management

Beyond CVSS: Introducing Digital Proximity™ for Smarter Risk Models

Supply Chain Risk Management

Shadow IT on Campus: How Hidden Risk is Undermining Education Cybersecurity

Supply Chain Risk Management

Digital Twins, Real Threats: Securing the Manufacturing Supply Chain

External Attack Surface Management

10 Questions and Metrics for CISOs to Track Exposure & Supply-Chain Risk

more blogs

Datasheets

Datasheet

How ThingsRecon Capabilities Support DORA Compliance 

Datasheet

Supply Chain Discovery 

Datasheet

Digital Attack Surface Discovery 

more datasheets

Videos

Video

800,000 Vulnerabilities Later: What Security Teams Still Miss About Risk

Video

All Things Cyber: Building The Security Tool We Wished We Had

Video

What Powers Our Recon (And Why It Works)

Video

CNN Interview: Power Outages and Critical Infrastructure Risk

more videos

We're just
a message away

get in touch
Platform
attack surface deep discovery
supply chain risk management
contact us
about us
Learn
the recon log
all things cyber
academy

©ThingsRecon 2025.

Amsterdam, The Netherlands

Privacy Policy

Cookie Policy

Terms of Use

Contact us