Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Filters
Showing 1–6 of 462 results
Palo Alto Expedition: From N-Day to Full Compromise
On July 10, 2024, Palo Alto released a security advisory for CVE-2024-5910, a vulnerability which allowed attackers to remotely reset the Expedition application admin credentials. While we had never heard of Expedition application before, it’s advertised as: The purpose of this tool is to help reduce the time and efforts of migrating a configuration from a supported vendor to Palo...
Read More 8 Steps for Enhancing Cybersecurity Post-Breach
A 8-step guide to strengthening cybersecurity post-breach with autonomous pentesting and continuous risk assessment using NodeZero.
Read More Enhancing Cybersecurity Post-Breach: A Comprehensive Guide
Enhance cybersecurity post-breach with 7 strategies using NodeZero™ for continuous testing, threat detection, and improved defenses for lasting protection.
Read More Top 150 Cybersecurity Vendors
Top 150 Cybersecurity Vendors
Read More Detection Done Differently: Best practices for automating & improving threat detection in your org
As cyber attacks become increasingly complex, sophisticated, and more frequent, security teams need to be able to identify attacks faster and with higher accuracy. But users report that current detection workflows have high set-up and maintenance needs and introduce lots of noise and time-consuming false-positives. In this session, we highlight new approaches to overcome those drawbacks: - Why rapid threat...
Read More Keith Poyser Appointed as Vice President for EMEA at Horizon3.ai
Business Wire 09/25/2024 Horizon3.ai, a global leader in autonomous security solutions, today announced the appointment of Keith Poyser as Vice President for EMEA. Poyser brings more than 25 years of experience in driving sales growth, strategy, and business development in leading cybersecurity and technology firms. Read the entire article here
Read More