Horizon3.ai
Horizon3.ai

Resource Center

Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.

Filters

Categories
Tags

Showing 265–270 of 473 results

Who wins: Characteristics of a promising startup

SC Media: 08/22/22 Despite a tumultuous market, cybersecurity companies continue to draw millions in venture dollars. So how can startups and investors alike best leverage the relationship? As part of the SC Awards Winners Circle video series, SC Media dug into this dynamic with Dave DeWalt, founder and managing director of NightDragon, recipient of our Best Growth-Stage Investor Of The...
Read More

Most Promising Early-Stage Start Up | Horizon3.ai

SC Media: 08/22/22 Horizon3.ai has developed, NodeZero, an autonomous penetration testing platform that continuously assesses an enterprise’s attack surface, identifying ways an attacker could chain together harvested credentials, misconfigurations, dangerous product defaults, and exploitable vulnerabilities to compromise systems and data. Read the entire article here
Read More

Horizon3.ai Wins Most Promising Early-Stage Startup in 2022 SC Awards

Businesswire: 08/22/22 Horizon3.ai announced that it has been recognized as an Excellence Award winner in the Most Promising Early-Stage Startup category for the 2022 SC Awards. Now in its 25th year, the industry awards program is cybersecurity’s most prestigious and competitive program, recognizing the solutions, organizations, and people driving innovation and success in information security. Read the entire article here
Read More

Apple warns of cybersecurity vulnerabilities affecting millions of devices

Security Magazine: 08/19/22 Affected organizations and users can install the updates released by Apple to protect their devices from exploits of the disclosed vulnerabilities. According to Corey Sinclair, Cyber Threat Intelligence Analyst at Horizon3ai, “We often find that malicious threat actors do not take advantage of zero-day vulnerabilities.” Read the entire article here
Read More