Quantcast
Channel: Horizon3.ai
Browsing all 218 articles
Browse latest View live

Building Cyber Resilience Across a Distributed Network

To empower North Carolina’s rural communities by delivering safe, reliable, and affordable electricity through a cooperative model that champions innovation, resilience, and sustainability. North...

View Article


Top 150 Cybersecurity Vendors 2025

2025 Cyber 150… Source

View Article


Fireside Chat: Horizon3.ai and North Carolina’s Electric Cooperatives

Stephen Gates, Horizon3.ai Principal Security SME and Brian Burnett, Director of Cybersecurity at North Carolina Electric Cooperatives explore how Brian’s team has implemented innovative strategies to...

View Article

Securing Financial Services: From Promises to Proof with NodeZero®

The financial services sector continues to experience a sharp rise in cyber threats targeting their industry. In just the third quarter of 2024, 141 breaches in this sector impacted over 16 million...

View Article

Proactive Cyber Defense: Why Continuous Security Testing is Essential for...

Increased scrutiny from regulators and shareholders means that security lapses now carry real legal consequences. Executives, corporate officers, and General Counsels must adopt a proactive...

View Article


Uncover the Past, Secure the Future: The History of Pentesting

Penetration testing has been shaping cybersecurity for decades—long before modern enterprises recognized its necessity. What started as a niche practice among military strategists, security...

View Article

Fireside Chat: Horizon3.ai and Jerome’s Furniture

Adam Warren, IT Director at Jerome’s Furniture, sits down with Horizon3.ai’s Principle Security SME, Stephen Gates, to discuss how Jerome’s has evolved its cybersecurity strategy over the years. From...

View Article

Ivanti Endpoint Manager – Multiple Credential Coercion Vulnerabilities

Back in October of 2024, we were investigating one of the many Ivanti vulnerabilities and found ourselves without a patch to “patch diff” with – leading us to audit the code base at mach speed. This...

View Article


The Market Shifts to Autonomous Pentesting: Horizon3.ai Surpasses 100,000...

Business Wire 02/19/2025 Horizon3.ai, a global leader of autonomous security solutions, announced today that NodeZero® has surpassed 100,000 pentests conducted by over 3,000 customers, with projections...

View Article


Horizon3.ai Achieves 101% YoY Revenue Increase and Sets New Record in Q4...

Business Wire 02/25/2025 Horizon3.ai, a global leader of autonomous security solutions, continues to set new industry benchmarks, achieving 101% year-over-year revenue growth and exceeding 150% of Q4...

View Article

2025 Top Rated Software Award

2025 Top Rated Software Award… Source

View Article

Identify Cybersecurity Risks at Scale to De-Risk M&A Transactions with...

Mergers and acquisitions introduce significant cybersecurity risks, from unknown vulnerabilities in the target company’s IT infrastructure to latent threats that could persist post-acquisition....

View Article

Breaking the Bank: How NodeZero® Secured a Financial Giant in Just 14 Hours

Financial services faced 141 breaches in Q3 2024 alone, exposing over 16 million victims. Cybercriminals exploit hidden vulnerabilities that traditional tools often fail to detect—leaving organizations...

View Article


Why Every New CISO Should Run NodeZero® on Day One

Taking on the role of a Chief Information Security Officer (CISO) comes with a sobering realization: the clock starts ticking the moment you step into the role. Cyber threats don’t wait, and your...

View Article

Traditional vs. Autonomous: Why NodeZero® is the Future of Cyber Risk...

For years, organizations have relied on human-led pentests—but these outdated methods are slow, expensive, and leave security gaps between tests. This white paper reveals… Source

View Article


Is Continuous Threat Exposure Management right for you?

Let’s talk about YAGC (Yet Another Gartner® Category—we kid, we kid): CTEM. Truth is the cybersecurity space is overflowing with acronyms, frameworks, and categories, and, like vulnerability scanning,...

View Article

Fireside Chat: Horizon3.ai and Adaptic LLC

Cyber threats against the DoD supply chain are escalating, with sophisticated attacks surging 431% since 2021. Small and mid-sized businesses (SMBs)—the backbone of the Defense Industrial Base...

View Article


CVE-2025-24813

A Rapid Response card and targeted test have been released for CVE-2025-24813 against Apache Tomcat. The vulnerability uses deserialization of untrusted data that enables an unauthenticated attacker to...

View Article

Critical or Clickbait: GitHub Actions and Apache Tomcat RCE Vulnerabilities 2025

Trendy vulnerabilities aren’t always worth the hype—panic-driven responses often lead to wasted time and resources. This is top of mind for us as we’ve researched recent issues regarding Github Actions...

View Article

The State of Cybersecurity in 2025: Data-Driven Insights from Over 50,000...

Attackers innovate at machine speed, chaining weaknesses for maximum impact—while security teams are stuck reacting, overwhelmed by false positives, slow patching cycles, and compliance-driven security...

View Article
Browsing all 218 articles
Browse latest View live


Latest Images