Step into an engaging discussion with Kubernetes security experts as we explore how this container orchestration tool’s superpower in enabling scalable and available assets for organizations can be used against itself to pave a critical attack path into the underlying...
In the evolving landscape of cloud and hybrid environments, robust security measures are more critical than ever. In this webinar Brad Hong, CISSP, explores autonomous pentesting methodologies and strategies that can help your organization take a more efficient and...
In this webinar. Horizon3.ai cybersecurity expert Brad Hong covers our new Rapid Response service, including: – How this service enables you to preemptively defend against high-profile threats – How our Attack Team develops its tailored threat intelligence...
It’s World Password Day, but it’s never a bad time to think about credential security and usage. Credentialed attacks are the most popular means of entry into any digital infrastructure, and remain the easiest method of reconnaissance and privilege escalation for bad...
Endpoint Detection and Response products are a critical and fundamental part of your security stack. The main function of an EDR is to detect and alert security teams to anomalous, and likely malicious, activities occurring on a given device in real-time with the...