Andy Hornegold

VP of Product
Andy has a long career in cyber security including a decade in threat simulation and consulting. Career highlights include being the Assurance Regional Lead at one of the UK's leading cyber security consultancies and helping critical national infrastructure providers stay secure. Most recently, Andy was the EU Red Team Operations Lead at Mandiant, building out and leading the security team to deliver high quality intelligence-led threat simulations.

Andy Hornegold

's Posts

Clear all filters
What's new? Product updates from Intruder October 2024

What's new? Product updates from Intruder October 2024

Intruder’s subdomain and related domain discovery, integrations with Cloudflare, Microsoft Sentinel, Okta, and a look ahead at Q4.
Product
What Is Exposure Management And How Does It Differ From ASM?

What Is Exposure Management And How Does It Differ From ASM?

Learn all about exposure management, how it differs from ASM, and how to get started with implementing an exposure management program.
Attack surface management
How Intruder Supports Your Compliance Journey: Frameworks and Criteria

How Intruder Supports Your Compliance Journey: Frameworks and Criteria

Simplify your cybersecurity compliance journey with Intruder. Discover how we help you meet key compliance frameworks and fulfill specific security criteria.
Compliance
What's new? Product updates from Intruder July 2024

What's new? Product updates from Intruder July 2024

Intruder’s asset discovery capabilities, further attack surface management features, access controls, and a look ahead at Q3.
Product
Focus on what matters most: Exposure management and your attack surface

Focus on what matters most: Exposure management and your attack surface

Our VP of Product shares his insights on the importance of exposure management and how it can enable teams to achieve the greatest impact with the least time invested.
Attack surface management
What's new? Product updates from Intruder April 2024

What's new? Product updates from Intruder April 2024

Intruder’s attack surface management tools, AWS integration improvements, and enhanced web application scanning.
Product
Mastering Cloud Defense: Cloud & Cybersecurity Expo 2024 Recap

Mastering Cloud Defense: Cloud & Cybersecurity Expo 2024 Recap

Catch up on the highlights from our VP of Product’s talk on mastering cloud defense at this year’s Cloud & Cybersecurity Expo in London.
Cloud security
6 Cyber Security Trends For 2024 And How To Stay Ahead

6 Cyber Security Trends For 2024 And How To Stay Ahead

Andy Hornegold shares his cybersecurity predictions for 2024. From more zero-day attacks to exposure management and increased regulation, is your organization ready?
Insights
What's new? Product updates from Intruder February 2024

What's new? Product updates from Intruder February 2024

Intruder’s attack surface management tools, AWS integration improvements, and enhanced web application scanning.
Product
Better together: Nuclei and Tenable

Better together: Nuclei and Tenable

How do Tenable and Nuclei compare? We researched both to see how they work together for even better coverage.
Vulnerability scanning
What's new? Product updates from Intruder November 2023

What's new? Product updates from Intruder November 2023

Intruder’s new analytics tab, verifying that authenticated web apps have been setup correctly is now much easier, and a new compliance integration!
Product
What's new? Product updates from Intruder September 2023

What's new? Product updates from Intruder September 2023

Intruder’s list of integrations continues, adding internal targets is now much more intuitive, and remediation scans are live!
Product
What's new? Product updates from Intruder July 2023

What's new? Product updates from Intruder July 2023

Drata and Azure DevOps integrations are live, security advisories are now tracked in the portal and there are some impressive enhancements for you to try.
Product
API security: ​How basic failings cause breaches​

API security: ​How basic failings cause breaches​

Our Product Lead explores recent high-profile API breaches caused by simple failings, and shares his top tips for API security.
Application security
OpenVAS vs. Nessus - A Comprehensive Analysis

OpenVAS vs. Nessus - A Comprehensive Analysis

OpenVAS and Nessus are two of the most widely adopted vulnerability scanners with a shared history. We have provided a comprehensive comparison of how they measure up.
Vulnerability scanning
Product Update: Continuous Network Scanning

Product Update: Continuous Network Scanning

We’re excited to announce more enhancements to our continuous network scanning with new features to Network View, continuous scanning and an even better UX.
Product
Mind the gap – how to ensure your vulnerability detection methods are up to scratch

Mind the gap – how to ensure your vulnerability detection methods are up to scratch

With global cyber crime costs expected to reach $10.5 trillion annually by 2025, it comes as little surprise that the risk of attack ...
Vulnerability scanning
Log4j vulnerability: what is it and how to detect it?

Log4j vulnerability: what is it and how to detect it?

Apache Log4j is a logging package for Java which has been widely adopted and integrated into many applications. Developers need a way of ...
Vulnerabilities and Threats
No results found
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.