New in NodeZero®
Cybersecurity report visualization highlighting the gap between security confidence and validated attack resistance

The State of Assumed Security

Horizon3.ai
April 28, 2026

Horizon3.ai Research Report

Organizations measure activity. Attackers test resistance.

Dashboards indicate a strong security posture, with patches applied, tickets closed, and metrics trending in the right direction.

Attackers don’t validate dashboards. They test whether they can get in, move laterally, and reach impact.

So the question that matters is simple:

Can an attacker actually succeed in your environment right now?

Most organizations can demonstrate that work was completed.
Fewer consistently validate that:

  • attack paths have been eliminated
  • weaknesses can no longer be exploited

That gap is where attackers gain an advantage.

750 security leaders and practitioners surveyed. Confidence outpaces validation.

Confidence is high
93% of CISOs believe they’ve taken the right steps to prevent a breach

Testing is limited
Only 12% have validated EDR effectiveness in the last 3 months

Detection is trusted, not proven
Just 26% test whether their SOC detects and interrupts real attack techniques

Exposure lingers longer than expected
Only 11% confirm or remediate known exploited vulnerabilities within 24 hours


Download the report to understand where your security assumptions may break


Security programs prove completion. Not always resistance.

Security programs are efficient and well-instrumented. They scan, prioritize, patch, and close tickets.

But attackers don’t operate in tickets or severity scores. They reuse credentials, move laterally, and chain small weaknesses into real outcomes.

A patched vulnerability does not guarantee it is no longer exploitable.
A closed ticket does not necessarily mean the attack path is gone.

What matters is whether an attacker can still:

  • move
  • escalate
  • reach what matters

In many environments, this is not tested consistently.

Where security confidence breaks down

Most teams know when a vulnerability is patched.
Fewer know whether it can still be exploited.

That distinction defines real exposure.

This report shows:

  • Why scans and rescans confirm fixes, but not whether attack paths are closed
  • How remediation reduces backlog while exploitable conditions may remain
  • Where detection identifies activity but does not consistently interrupt attacker movement
  • How identity and lateral movement continue to bypass well-instrumented controls

If you’re not validating, you’re assuming

Security maturity is not defined by how much you deploy or how fast you close tickets.
It’s defined by whether you can demonstrate that defenses hold under real conditions.

If environments are not tested the way attackers operate, risk is not being measured.

It is being assumed.

Confidence does not stop an attacker. Confirmation does.

Download the report to see how your organization compares

How can NodeZero help you?
Let our experts walk you through a demonstration of NodeZero®, so you can see how to put it to work for your organization.
Get a Demo
Share: