Industry Intelligence

SEARCH

CATEGORIES

TAGS

    Tech Talk: The Attackers Journey Pt.1

    Join us in side-saddling on an attacker’s journey with Noah King to become an ethical hacker!

    The Industry Standard Model is the Vulnerability

    February 11, 2022
    Which is more valuable to you; the ability to identify a problem, or the ability to solve the problem? There is a plethora of vulnerability scanning tools that do a decent job identifying vulnerabilities. Unfortunately, those tools rarely discern the possible from the exploitable.

    NYIS Fireside Chat with David Raviv

    On January 28, 2022, CEO and Co-founder Snehal Antani sat down with host David Raviv of NY Information Security Meetup for an insightful fireside chat. They discussed Snehal's career as former CTO of Splunk and JSOC, his inspiration for starting Horizon3, and his outlook on the future of cyber warfare. Learn about: - Employing a…

    Credential Misconfigurations

    October 25, 2021
    Are your credential policies implemented right? Are your enterprise accounts configured correctly? How do you know? Most phishing, ransomware, and credential attacks start by gaining access to a host and compromising a domain user (Credential Attacks – Horizon3.ai). With a credential in hand, an attacker can persist and pervade, appearing like a legitimate user and…
    Credential Misconfigurations - Abstract cubes that don't fit together properly.

    Be Open to Be Wow’d

    July 29, 2021
    Being a #learnitall, Lesson 1: Be Open to Be Wow’d Most of the startup advice out there is pretty clear: get feedback early and often. Customer input is invaluable to delivering iter0, your MVP, feature releases that matter, bug fixes, utility and simplicity. In Customer Success, a lot of the job is review and advise so…
    Emoji making a surprised face

    Tech Talk: Compliance in Security

    In the world of network security, compliance is the bare minimum. Compliance is locking your door, but what about your windows?
    Compliance in Security Tech Talk

    Purple Teams

    February 23, 2021
    Purple teaming is the result of collaboration, communication and sharing of information between a red team and a blue team in an effort to improve the overall security posture of an organization. How organizations comprise these components may vary, but for context, a Red team is the offensive security team. They are trained in the…
    Purple board game piece between a line of blue pieces and a line of red pieces