Horizon3.ai
Horizon3.ai

Resource Center

Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.

Filters

Categories
Tags

Showing 13–17 of 17 results

The Purple Pivot

This Red vs. Blue approach to cybersecurity is unsustainable, and often does more harm than good. The goal should be Red AND Blue, working together.
Read More

Exposed & Exploited

While so many are focused on vulnerabilities and malware on endpoints, understanding the attack paths an attacker would exploit to hold your business and brand at risk is key.
Read More

The Password Pandemic

Attackers don’t have to “hack in” using zero days like the movies, often they can just “log in” using user id’s and passwords they’ve harvested elsewhere.
Read More

Compliance in Security

Are you ready to respond to Ransomware? If APT29 is targeting your sector, can you detect and disrupt their known tactics, techniques, and procedures?
Read More