Quantcast
Channel: Horizon3.ai
Browsing all 140 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing

Revolutionizing Cybersecurity with NodeZero™ for Comprehensive Risk Assessment and Prioritization Traditional vulnerability scanning tools have been essential for identifying systems running software...

View Article


Horizon3.ai Celebrates Significant Growth and Innovations in First Half of 2024

Business Wire 07/09/2024 Horizon3.ai, a leading provider of autonomous security solutions, marked the close of the first six months of 2024 with a celebration of the Company’s growth across all...

View Article


Image may be NSFW.
Clik here to view.

Ensuring Cybersecurity: Horizon3.ai’s Rapid Response Service in Action

How Horizon3.ai’s Rapid Response Identified and Mitigated a Critical Mirth Connect Vulnerability A key consideration in cybersecurity is determining whether a known software vulnerability is actually...

View Article

Fireside Chat: Horizon3.ai and Komori

Komori America Director of IT Andy Katz joins Horizon3.ai Principal Security SME Stephen Gates to discuss: – How Andy’s adaptation of IT technology usage and implementation has dramatically changed...

View Article

Image may be NSFW.
Clik here to view.

Future-Proofing Cities: LYT’s Story

About LYT A cloud-based traffic management solution provider  Mission LYT is a cloud software solution that uses state-of-the-art connected vehicle and machine learning technologies to prioritize the...

View Article


NodeZero Capability Statement

The NodeZeroTM platform empowers your organization to reduce your security risk by autonomously finding exploitable weaknesses in your network, giving you detailed guidance about how to prioritize and...

View Article

NodeZero Fact Sheet

The NodeZeroTM platform empowers your organization to reduce your security risk by autonomously finding exploitable weaknesses in your network, giving you detailed guidance about how to prioritize and...

View Article

NodeZero Tripwires

NodeZero Tripwires™ enhances threat detection and response by autonomously deploying decoys and monitoring for unauthorized access in high-risk areas. Integrated with NodeZero’s pentesting, it provides...

View Article


NodeZero Cloud Pentesting

NodeZero Cloud Pentesting offers autonomous, comprehensive pentests for cloud and hybrid environments, validating security policies and assessing risks from internal and external perspectives. It...

View Article


Horizon3.ai Launches NodeZero™ Cloud Pentesting to Transform Cloud Security

Business Wire 07/30/2024 Horizon3.ai, a leading provider of autonomous security solutions, today announced the launch of NodeZero™ Cloud Pentesting. This innovative solution helps organizations...

View Article

Tech Mahindra and Horizon3.ai Partner to Enhance AI-based Cyber Resilience...

Business Wire 07/30/2024 Tech Mahindra (NSE: TECHM), a leading global provider of technology consulting and digital solutions to enterprises across industries, announced a strategic partnership with...

View Article

Tech Ascension 2024 Best Cloud Security Solution

Tech Ascension 2024 Best Cloud Security Solution The post Tech Ascension 2024 Best Cloud Security Solution appeared first on Horizon3.ai.

View Article

Horizon3.ai Partners with FedHIVE to Revolutionize Cybersecurity in the...

Business Wire 08/13/2024 Horizon3.ai, a global leader in autonomous security solutions for both public and private sectors, today announced their partnership with FedHIVE, a leading cloud service...

View Article


Strengthening Cloud Security: A Comprehensive Approach

In the evolving landscape of cloud and hybrid environments, robust security measures are more critical than ever. In this webinar Brad Hong, CISSP, explores autonomous pentesting methodologies and...

View Article

Image may be NSFW.
Clik here to view.

Mastering Cloud Security: Uncovering Hidden Vulnerabilities with NodeZero™

Cloud environments are inherently complex, with each provider offering unique security-focused configurations and approaches. With that comes an array of new types of vulnerabilities. Managing these...

View Article


Image may be NSFW.
Clik here to view.

Traccar 5 Remote Code Execution Vulnerabilities

Traccar is a popular open source GPS tracking system used both by people for personal use and businesses for fleet management. This post covers two related path traversal vulnerabilities affecting...

View Article

Image may be NSFW.
Clik here to view.

NTLM Credential Theft in Python Windows Applications

NTLMv2 hash theft is a well known credential harvesting technique made possible by the insistence of Windows to automatically authenticate to anything it possibly can. It’s a staple technique used in...

View Article


Image may be NSFW.
Clik here to view.

Gartner® Report Hype Cycle™ for Security Operations, 2024

“Security operations technology and services defend IT/OT systems, cloud workloads, applications and other digital assets from attack by identifying threats, vulnerability and exposures.”1 In this...

View Article

Unveiling NodeZero Tripwires™: Horizon3.ai Enhances Penetration Testing with...

Business Wire 09/10/2024 Horizon3.ai, a global leader in autonomous security solutions, today unveiled NodeZero Tripwires™, an addition to its product suite that integrates attack detection directly...

View Article

Image may be NSFW.
Clik here to view.

Stay Ahead of Cyber Threats with Autonomous Penetration Testing

Unlock the Power of Automation and AI to Meet NIS 2 Compliance Requirements  The NIS 2 Directive is transforming the cybersecurity landscape across the European Union. Whether you’re in the public or...

View Article
Browsing all 140 articles
Browse latest View live