Podcast: Put Your Company’s Cybersecurity to the Test

Avatar photo
Conor Quinlan

Episode Summary

In this episode, we welcome Alex Diaz. Alex is the Customer Success Lead at Horizon3.ai’s. He has extensive experience in intelligence positions with the US Military and Government. Horizon3.ai’s mission is to help you find and fix your attack vectors before criminals exploit them.

We go over what penetration testing, also know as pentesting, entails and how it helps organizations looking to test and improve their cybersecurity. Then we go into how it has been done traditionally and what new technology advances are happening today to revolutionize the whole process. NodeZero, Horizon3.ai’s automated penetration testing solution, enables organizations to continuously assess the security posture of their enterprise, including external, identity, on-prem, IoT, and cloud attack surfaces.

The important use-cases for autonomous penetration include:

  • Validate security tools in place are properly configured and working.
  • Determine if vulnerabilities in your system have a high risk to the environment.
  • After patching or making system changes, an autonomous pentest can ensure everything is working correctly.
  • Continuously test your systems in a systematic way, allowing organizations to benchmark and track success over time.

The top areas of weakness Alex and Horizon3.ai see in companies are shared in their 2022 year in review report. After analyzing 7,000 pentests from last year, these are the top 3:

  1. Weak credential policies
  2. Patching and incorrect configurations
  3. Lack of properly tuned security tools

An autonomous penetration test is not designed to simply replace a human penetration tester, but rather help them make the most of their time and better help the end customer. By combining physical penetration tests and social engineering with an autonomous penetration test, organizations can ensure they are protected from all angles.

Video Version

Listen to more episodes at www.airiam.com/podcast, on Spotify, Apple Podcasts, Google Podcasts, Amazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

The Best Failover Solutions for Business Continuity

Failover is the process of automatically switching to a redundant system when your primary one fails to guarantee continuous operation. With today’s always-on, never-stop business environment, failover solutions aren’t just nice-to-haves—they’re non-ne
Vivian Lee
>>Read More

Ransomware Attack Risk Reduction

You see it in the news all the time: businesses, universities, municipalities, and more, all getting hit with Ransomware. This has unfortunately become all too common, and these are not isolated instances. So who is at risk of a Ransomware attack? All
Avatar photo
Andy Gritzer
>>Read More

Failover vs DRaaS: How to Choose the Right Recovery Strategy

It’s 2 AM, and your phone is buzzing with alerts. Your primary data center just went dark: maybe it’s a ransomware attack, maybe it’s a flood, or maybe it’s just Murphy’s Law striking at the worst possible moment.  As you stumble out of bed, one questi
Vivian Lee
>>Read More