Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing
Revolutionizing Cybersecurity with NodeZero™ for Comprehensive Risk Assessment and Prioritization Traditional vulnerability scanning tools have been essential for identifying systems running software...
View ArticleHorizon3.ai Celebrates Significant Growth and Innovations in First Half of 2024
Business Wire 07/09/2024 Horizon3.ai, a leading provider of autonomous security solutions, marked the close of the first six months of 2024 with a celebration of the Company’s growth across all...
View ArticleEnsuring Cybersecurity: Horizon3.ai’s Rapid Response Service in Action
How Horizon3.ai’s Rapid Response Identified and Mitigated a Critical Mirth Connect Vulnerability A key consideration in cybersecurity is determining whether a known software vulnerability is actually...
View ArticleFireside Chat: Horizon3.ai and Komori
Komori America Director of IT Andy Katz joins Horizon3.ai Principal Security SME Stephen Gates to discuss: – How Andy’s adaptation of IT technology usage and implementation has dramatically changed...
View ArticleFuture-Proofing Cities: LYT’s Story
About LYT A cloud-based traffic management solution provider Mission LYT is a cloud software solution that uses state-of-the-art connected vehicle and machine learning technologies to prioritize the...
View ArticleNodeZero Capability Statement
The NodeZeroTM platform empowers your organization to reduce your security risk by autonomously finding exploitable weaknesses in your network, giving you detailed guidance about how to prioritize and...
View ArticleNodeZero Fact Sheet
The NodeZeroTM platform empowers your organization to reduce your security risk by autonomously finding exploitable weaknesses in your network, giving you detailed guidance about how to prioritize and...
View ArticleNodeZero Tripwires
NodeZero Tripwires™ enhances threat detection and response by autonomously deploying decoys and monitoring for unauthorized access in high-risk areas. Integrated with NodeZero’s pentesting, it provides...
View ArticleNodeZero Cloud Pentesting
NodeZero Cloud Pentesting offers autonomous, comprehensive pentests for cloud and hybrid environments, validating security policies and assessing risks from internal and external perspectives. It...
View ArticleHorizon3.ai Launches NodeZero™ Cloud Pentesting to Transform Cloud Security
Business Wire 07/30/2024 Horizon3.ai, a leading provider of autonomous security solutions, today announced the launch of NodeZero™ Cloud Pentesting. This innovative solution helps organizations...
View ArticleTech Mahindra and Horizon3.ai Partner to Enhance AI-based Cyber Resilience...
Business Wire 07/30/2024 Tech Mahindra (NSE: TECHM), a leading global provider of technology consulting and digital solutions to enterprises across industries, announced a strategic partnership with...
View ArticleTech Ascension 2024 Best Cloud Security Solution
Tech Ascension 2024 Best Cloud Security Solution The post Tech Ascension 2024 Best Cloud Security Solution appeared first on Horizon3.ai.
View ArticleHorizon3.ai Partners with FedHIVE to Revolutionize Cybersecurity in the...
Business Wire 08/13/2024 Horizon3.ai, a global leader in autonomous security solutions for both public and private sectors, today announced their partnership with FedHIVE, a leading cloud service...
View ArticleStrengthening Cloud Security: A Comprehensive Approach
In the evolving landscape of cloud and hybrid environments, robust security measures are more critical than ever. In this webinar Brad Hong, CISSP, explores autonomous pentesting methodologies and...
View ArticleMastering Cloud Security: Uncovering Hidden Vulnerabilities with NodeZero™
Cloud environments are inherently complex, with each provider offering unique security-focused configurations and approaches. With that comes an array of new types of vulnerabilities. Managing these...
View ArticleTraccar 5 Remote Code Execution Vulnerabilities
Traccar is a popular open source GPS tracking system used both by people for personal use and businesses for fleet management. This post covers two related path traversal vulnerabilities affecting...
View ArticleNTLM Credential Theft in Python Windows Applications
NTLMv2 hash theft is a well known credential harvesting technique made possible by the insistence of Windows to automatically authenticate to anything it possibly can. It’s a staple technique used in...
View ArticleGartner® Report Hype Cycle™ for Security Operations, 2024
“Security operations technology and services defend IT/OT systems, cloud workloads, applications and other digital assets from attack by identifying threats, vulnerability and exposures.”1 In this...
View ArticleUnveiling NodeZero Tripwires™: Horizon3.ai Enhances Penetration Testing with...
Business Wire 09/10/2024 Horizon3.ai, a global leader in autonomous security solutions, today unveiled NodeZero Tripwires™, an addition to its product suite that integrates attack detection directly...
View ArticleStay Ahead of Cyber Threats with Autonomous Penetration Testing
Unlock the Power of Automation and AI to Meet NIS 2 Compliance Requirements The NIS 2 Directive is transforming the cybersecurity landscape across the European Union. Whether you’re in the public or...
View Article