Podcast: Put Your Company’s Cybersecurity to the Test

Avatar photo
Conor Quinlan

Episode Summary

In this episode, we welcome Alex Diaz. Alex is the Customer Success Lead at Horizon3.ai’s. He has extensive experience in intelligence positions with the US Military and Government. Horizon3.ai’s mission is to help you find and fix your attack vectors before criminals exploit them.

We go over what penetration testing, also know as pentesting, entails and how it helps organizations looking to test and improve their cybersecurity. Then we go into how it has been done traditionally and what new technology advances are happening today to revolutionize the whole process. NodeZero, Horizon3.ai’s automated penetration testing solution, enables organizations to continuously assess the security posture of their enterprise, including external, identity, on-prem, IoT, and cloud attack surfaces.

The important use-cases for autonomous penetration include:

  • Validate security tools in place are properly configured and working.
  • Determine if vulnerabilities in your system have a high risk to the environment.
  • After patching or making system changes, an autonomous pentest can ensure everything is working correctly.
  • Continuously test your systems in a systematic way, allowing organizations to benchmark and track success over time.

The top areas of weakness Alex and Horizon3.ai see in companies are shared in their 2022 year in review report. After analyzing 7,000 pentests from last year, these are the top 3:

  1. Weak credential policies
  2. Patching and incorrect configurations
  3. Lack of properly tuned security tools

An autonomous penetration test is not designed to simply replace a human penetration tester, but rather help them make the most of their time and better help the end customer. By combining physical penetration tests and social engineering with an autonomous penetration test, organizations can ensure they are protected from all angles.

Video Version

Listen to more episodes at www.airiam.com/podcast, on Spotify, Apple Podcasts, Google Podcasts, Amazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

7 Security Operations Center (SOC) Tools for Advanced Security

Ransomware attacks have tripled since 2020. The average incident now costs businesses $1.85 million, and that number keeps climbing. And while 60% of companies run security operations centers (SOCs), most are flying blind with fragmented tools and silo
Jesse Sumrak
>>Read More

Tabletop Exercises: Test Your Incident Response Before Crisis

It’s 3 AM when your phone rings. Your company’s systems are locked down with ransomware. Customer data is compromised. Operations have ground to a halt. Your executive team is looking to you for answers, and the clock is ticking. How does your team res
Jesse Sumrak
>>Read More

Complete Guide to Remote Monitoring and Management (RMM)

Remember when IT meant walking desk to desk, updating computers one at a time? Those days are long gone. Today’s businesses run on complex networks spanning offices, homes, and everywhere in between. However, your IT team can’t be everywhere at once, a