Whitepapers
SEARCH
CATEGORIES
TAGS
Healthcare IT – Far Beyond HIPAA Compliance
August 19, 2022
Take a deeper look at critical threats against the healthcare sector and how to overcome the industry’s specific challenges.
The Shortcomings of Traditional Penetration Tests
July 29, 2022
Companies tend to conduct pentests in flawed ways. Now a better, more automated, and faster approach to pentesting has arrived.
2022 SANS Analyst Report
April 17, 2022
SANS First Look: New technologies are emerging to help provide more consistent, repeatable pen tests that mimic real-world attack techniques.
Defense in Depth
February 19, 2022
Defense in depth is a proven strategy for protecting systems and software from insider and external attacks.
The Purple Pivot
November 18, 2021
This Red vs. Blue approach to cybersecurity is unsustainable, and often does more harm than good. The goal should be Red AND Blue, working together.
Exposed & Exploited
October 16, 2021
While so many are focused on vulnerabilities and malware on endpoints, understanding the attack paths an attacker would exploit to hold your business and brand at risk is key.
Vulnerable ≠ Exploitable
September 19, 2021
The hardest part of cyber security is deciding what NOT to do. Being vulnerable doesn’t mean you’re exploitable.
The Password Pandemic
September 10, 2021
Credential attacks bypass traditional defenses and cause billions in damage. Learn why they work, what’s at risk, and how Horizon3.ai helps fix what matters.
Compliance In Security: Go from Compliant to Secure
August 17, 2021
Learn why regulatory compliance is not enough for true cybersecurity. Discover how continuous automated pentesting and network segmentation help you move beyond check-the-box security.