0
Skip to Content
ThreatNG Security
ThreatNG Security
Product
Overview
Discover and Inventory
Assess, Examine, and Rate
Continuous Visibility and Monitoring
Report and Share
Collaborate and Manage
Solutions
External Attack Surface Management
Cloud and SaaS Exposure Management
Third-Party Risk Management
Digital Risk Protection
Security Ratings
Brand Protection
Due Diligence
Resources
Blog
Library
Support
DarcUpdates
Investigation Modules
Intelligence Repositories
ThreatNG Security Platform Training
Research
DarcSight Labs
Open Source Intelligence (OSINT)
Digital Presence Triad (FBI)
Functional Assets & Pillars
Open Source Repository Effort
About
Story
Contact
DARC Playlist
Two Way Tuesdays
Evaluate
ThreatNG Security
ThreatNG Security
Product
Overview
Discover and Inventory
Assess, Examine, and Rate
Continuous Visibility and Monitoring
Report and Share
Collaborate and Manage
Solutions
External Attack Surface Management
Cloud and SaaS Exposure Management
Third-Party Risk Management
Digital Risk Protection
Security Ratings
Brand Protection
Due Diligence
Resources
Blog
Library
Support
DarcUpdates
Investigation Modules
Intelligence Repositories
ThreatNG Security Platform Training
Research
DarcSight Labs
Open Source Intelligence (OSINT)
Digital Presence Triad (FBI)
Functional Assets & Pillars
Open Source Repository Effort
About
Story
Contact
DARC Playlist
Two Way Tuesdays
Evaluate
Folder: Product
Back
Overview
Discover and Inventory
Assess, Examine, and Rate
Continuous Visibility and Monitoring
Report and Share
Collaborate and Manage
Folder: Solutions
Back
External Attack Surface Management
Cloud and SaaS Exposure Management
Third-Party Risk Management
Digital Risk Protection
Security Ratings
Brand Protection
Due Diligence
Folder: Resources
Back
Blog
Library
Support
DarcUpdates
Investigation Modules
Intelligence Repositories
ThreatNG Security Platform Training
Folder: Research
Back
DarcSight Labs
Open Source Intelligence (OSINT)
Digital Presence Triad (FBI)
Functional Assets & Pillars
Open Source Repository Effort
Folder: About
Back
Story
Contact
DARC Playlist
Two Way Tuesdays
Evaluate

 

Beyond Typos - How Proactive Domain Permutation Analysis Secures Your Brand
Attack Surface, Attack Surface Management, Attack Surface Map, Business Attack Surface, External Attack Surface, External Attack Surface Management, Technical Attack Surface, Continuous Threat Exposure Management, Cyber Risk Exposure, External Exposure Management, Brand Damage Susceptibility, Brand Threat Intelligence Rakshina Padhiar 8/28/25 Attack Surface, Attack Surface Management, Attack Surface Map, Business Attack Surface, External Attack Surface, External Attack Surface Management, Technical Attack Surface, Continuous Threat Exposure Management, Cyber Risk Exposure, External Exposure Management, Brand Damage Susceptibility, Brand Threat Intelligence Rakshina Padhiar 8/28/25

Beyond Typos - How Proactive Domain Permutation Analysis Secures Your Brand

Read More
The Evolving Threat Landscape: Using Domain Intelligence to Vet Third Parties and Partners
Attack Surface, Attack Surface Management, Attack Surface Map, Business Attack Surface, External Attack Surface, External Attack Surface Management, Technical Attack Surface, Continuous Threat Exposure Management, External Exposure Management, Cyber Risk Exposure, Supply Chain and Third Party Exposure, Cloud Erin Price 8/26/25 Attack Surface, Attack Surface Management, Attack Surface Map, Business Attack Surface, External Attack Surface, External Attack Surface Management, Technical Attack Surface, Continuous Threat Exposure Management, External Exposure Management, Cyber Risk Exposure, Supply Chain and Third Party Exposure, Cloud Erin Price 8/26/25

The Evolving Threat Landscape: Using Domain Intelligence to Vet Third Parties and Partners

Read More
From TLD-Swaps to Repetitions: How to Shrink Your External Attack Surface
Attack Surface, Attack Surface Management, Attack Surface Map, Business Attack Surface, External Attack Surface, External Attack Surface Management, Continuous Threat Exposure Management, Cyber Risk Exposure, External Exposure Management, Supply Chain and Third Party Exposure, Threat Exposure Management, Third Party Risk Management, Brand Damage Susceptibility, Brand Threat Intelligence Rakshina Padhiar 8/24/25 Attack Surface, Attack Surface Management, Attack Surface Map, Business Attack Surface, External Attack Surface, External Attack Surface Management, Continuous Threat Exposure Management, Cyber Risk Exposure, External Exposure Management, Supply Chain and Third Party Exposure, Threat Exposure Management, Third Party Risk Management, Brand Damage Susceptibility, Brand Threat Intelligence Rakshina Padhiar 8/24/25

From TLD-Swaps to Repetitions: How to Shrink Your External Attack Surface

Read More
Free Evaluation: Agentless Cloud and SaaS Discovery and Assessment
Digital Presence Threat Management, Digital Risk Protection, External Attack Surface Management, Brand Threat Intelligence, Digital Reconnaissance, SaaS Security, Cybersecurity Risk Rating, Attack Surface Management Threat NG Staff 3/2/23 Digital Presence Threat Management, Digital Risk Protection, External Attack Surface Management, Brand Threat Intelligence, Digital Reconnaissance, SaaS Security, Cybersecurity Risk Rating, Attack Surface Management Threat NG Staff 3/2/23

Free Evaluation: Agentless Cloud and SaaS Discovery and Assessment

ThreatNG Empowers Users with Agentless Cloud and SaaS Exposure Assessment for External Attack Surface Management (EASM), Digital Risk Protection, and Security Ratings

Read More
Externally Discover, Assess, and Monitor Subdomain Content Across Your Entire Digital Ecosystem
Subdomain Content Identification Threat NG Staff 9/5/22 Subdomain Content Identification Threat NG Staff 9/5/22

Externally Discover, Assess, and Monitor Subdomain Content Across Your Entire Digital Ecosystem

Discover and Monitor for the Presence of Admin Pages, APIs, Applications, Application Links, Dev Environments, Emails, Errors, Phone Numbers, Tag Management Systems, VPNs in Subdomains

Read More
What is the Technical Attack Surface?
Technical Attack Surface, Attack Surface Threat NG Staff 6/18/21 Technical Attack Surface, Attack Surface Threat NG Staff 6/18/21

What is the Technical Attack Surface?

The Technical Attack Surface (currently popularized as the External Attack Surface) references all publicly available data that is revelatory about an organization's IT infrastructure, services, and applications.

Read More

ThreatNG
info@threatngsecurity.com

Product Solutions Resources Research About

 Copyright 2025 ThreatNG Security. All Rights Reserved.