Brad Fuller

Brad serves as the director of operations for HORNE Cyber. He guides clients to fully leverage technology innovations by providing the insights critical to safeguarding their business, customers’ critical data, and brand reputation.
Find me on:

Recent Posts

Jan 9, 2020 6:15:00 AM

The Case for Advanced Penetration Testing: Zero-Day Vulnerabilities in Symantec ICSP

Advanced Penetration Testing and Enhanced Red Teaming If you asked me what HORNE Cyber wants to be known for, I would quickly reply with “incomparable penetration testing.” From its conception, HORNE Cyber has placed heavy emphasis on the methodology used by its cyber operations specialists in penetration testing and red teaming engagements. Why do we feel penetration testing is so important? In our experience, we have found penetration testing and red teaming to be one of the most valuable investments an organization can make related to its cybersecurity efforts. However, there is no current standard when it comes to penetration testing services offered within the industry.   In fact, most penetration testing is simply a scan for publicly known vulnerabilities that may or may not be actionable on your network. While a good baseline, this approach often doesn’t improve your overall security posture. We are on a mission to create the gold standard through our advanced penetration testing and enhanced red teaming methodology by taking the approach of today's attackers. 

Topics: advanced penetration testing, Executive Insights

Oct 3, 2017 10:26:00 AM

The Cybersecurity Industry: Ignorance is Bliss

As I’ve pointed out before, the greatest threat to cyber security that organizations face today is the cybersecurity industry itself. I’ve long noticed that every business advisory firm in the country is now offering “penetration testing”, even as a critical industry talent shortage points to that not being possible. All you have to do now is buy a $2000 license for a vulnerability scanning tool, send an employee to a two-week training, and BOOM you have a “penetration tester.” 

Topics: Executive Insights, Good Enough Cybersecurity

May 30, 2017 10:11:00 AM

Cyber Security Silver Bullet: If It Seems Too Good to be True, It Probably Is

I’ve said it before and I’ll keep on saying it: The greatest threat to cyber security could likely be the cyber security industry itself and the “good enough” mindset.

Topics: Executive Insights

May 23, 2017 10:14:00 AM

There’s Simply No Such Thing as “Good Enough” in Cyber Security

History tells us that there comes a time when almost every new innovative service starts to lose ground to a “good enough” competitor.  In fact, many of the products that we buy are much cheaper than the original models, because competitors cut corners to make something that is good enough to fit our needs at a cheaper price. As a director of operations, I can fully appreciate a lower priced option that still fits the needs of my organization.

Topics: Executive Insights

Mar 2, 2017 10:00:00 AM

How Much Should You be Spending on Cybersecurity?

We often hear clients and prospective clients asking “how much should I be spending on cybersecurity?” That is a very complex question and one that is not easily answered without first having an understanding of what is meant by cybersecurity. There are many different versions of cybersecurity being pushed in the market and there is no "one size fits all" solution despite what your vendor may tell you. The key is in spending for what is right for your organization, not simply deciding that a set percentage should be spent on these solutions. Below are some key questions that you should ask of yourself:

Topics: IT Budget

Jun 7, 2016 11:00:00 AM

Key Considerations When Purchasing Cyber Insurance

From both current and prospective cyber insurance policy holders, we are frequently asked about what should be considered when purchasing a policy—what terms should be included, what are the important aspects and why. The answers to these questions are extremely complex, as cyber insurance is in its early infancy stages.

Topics: cybersecurity