Podcast: Put Your Company’s Cybersecurity to the Test

Avatar photo
Conor Quinlan

Episode Summary

In this episode, we welcome Alex Diaz. Alex is the Customer Success Lead at Horizon3.ai’s. He has extensive experience in intelligence positions with the US Military and Government. Horizon3.ai’s mission is to help you find and fix your attack vectors before criminals exploit them.

We go over what penetration testing, also know as pentesting, entails and how it helps organizations looking to test and improve their cybersecurity. Then we go into how it has been done traditionally and what new technology advances are happening today to revolutionize the whole process. NodeZero, Horizon3.ai’s automated penetration testing solution, enables organizations to continuously assess the security posture of their enterprise, including external, identity, on-prem, IoT, and cloud attack surfaces.

The important use-cases for autonomous penetration include:

  • Validate security tools in place are properly configured and working.
  • Determine if vulnerabilities in your system have a high risk to the environment.
  • After patching or making system changes, an autonomous pentest can ensure everything is working correctly.
  • Continuously test your systems in a systematic way, allowing organizations to benchmark and track success over time.

The top areas of weakness Alex and Horizon3.ai see in companies are shared in their 2022 year in review report. After analyzing 7,000 pentests from last year, these are the top 3:

  1. Weak credential policies
  2. Patching and incorrect configurations
  3. Lack of properly tuned security tools

An autonomous penetration test is not designed to simply replace a human penetration tester, but rather help them make the most of their time and better help the end customer. By combining physical penetration tests and social engineering with an autonomous penetration test, organizations can ensure they are protected from all angles.

Video Version

Listen to more episodes at www.airiam.com/podcast, on Spotify, Apple Podcasts, Google Podcasts, Amazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Why Data Backups Are Important (And How to Do Them Right)

Most businesses know data backups are important, but they still treat them as an afterthought. However, backups aren’t just important—they’re essential.  Losing your system data isn’t just an annoyance or a setback. It could break your business overnig
Jesse Sumrak
>>Read More

Frosty the Firewall: Building a Strong Defense

Frosty the Snowman was a fairytale they say, but cyber threats and threat actors are very, very real. Our digital defense systems might need a touch of magic to ward off the evolving dangers  in the cyber realm. Building a robust firewall, alongside ot
Vivian Lee
>>Read More

Webinar: Understand and Secure Your IT Environment

  Do you know what devices are connected to your network? Do you have a solid process for authenticating into your accounts? Do you use multi-factor authentication (MFA)? If not, you could be at risk of a breach. That’s why we’re bringing you this
Avatar photo
Conor Quinlan
>>Read More