SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

Navigating cyber threats with Horizon3.ai's NodeZero pentest platform

21 May 2024

Navigating cyber threats with Horizon3.ai's NodeZero pentest platform
Contact company
Contact Horizon3.ai
icon Add as a preferred source Download PDF version
Related Links
  • Joseph Carson from Delinea comments on ENISA's health sector specific cyber threat landscape report
  • How do new security technologies transform retail and loss prevention?

When it comes to cybersecurity, the economy is relying too heavily on defensive measures and neglecting self-assessments using autonomous penetration testing solutions to assess its cyber resilience.

This is the criticism of Rainer M. Richter, Head of Europe and Asia at the cybersecurity company Horizon3.ai. He points out that the European Central Bank (ECB) has been conducting stress tests to measure cyber resilience in the financial sector for years. "Companies in all sectors would be well advised to voluntarily undergo regular stress tests," Rainer M. Richter advises.

Penetration test

In a stress test, known in technical jargon as a "penetration test" or "pentest" for short, so-called white hat hackers are hired by the company to crack into its computer network to uncover vulnerabilities and other weaknesses. 

White hat hackers are hired by the company to crack into its computer network to uncover vulnerabilities

Rainer M. Richter points out, "White hat hackers are no longer needed because there are autonomous pen-testing solutions used for stress testing that are available from the cloud at a reasonable price. The German Federal Office for Information Security (BSI) writes in its 2023 situation report "The threat from cybercrime is higher than ever before," underscoring the urgent need for robust cybersecurity measures. 

Increasing demands for measuring Cyber Resilience

Rainer M. Richter points to the increasing demands being placed on the economy in terms of cyber resilience as a result of ever more stringent EU legislation. In addition to specific security requirements for the financial sector, many other sectors of the economy that are part of the “European Programme for Critical Infrastructure Protection” (EPCIP) are affected, says Rainer M. Richter.

As an example, he cites the new NIS2 (Network and Information Security) Directive, the EU-wide legislation on cybersecurity that came into force in 2023.

Cyber risks

Cyber risks exist not only within a company's operations but also with suppliers and distribution partners, emphasises security expert Rainer M. Richter.

He points out, "An attack on a business partner or supplier can spread directly to all associated companies. That's why NIS2 covers the entire supply chain."

Security breaches

Security breaches can also be fatal for companies that are not EPCIP-rated, Rainer M. Richter points

However, security breaches can also be fatal for companies that are not EPCIP-rated, Rainer M. Richter points out.

He explains, "When a company, regardless of sector or size, falls victim to a cyber attack, it not only can cause significant damage but also raises the question of who's to blame. Board members and managing directors who neglect the issue of cyber security will find themselves with one foot, if not both, in court."

Pentests are "affordable for every SME"

The security expert emphasises that autonomous pentests from the cloud are "affordable for every medium-sized company". "The costs scale with the number of workstations and the size of the computer network," Rainer M. Richter adds.

According to him, the operation is so simple that the pentest procedure, which was originally developed primarily for the corporate world, can now also be easily used by SMEs without having to hire external hackers.

Financial decision

The pentest costs must also be considered alongside the potential financial repercussions of cyber attacks, stresses the security expert.

With the European Union Agency for Cybersecurity (ENISA) estimating the total annual cost of cybercrime to the EU economy at approximately 180 billion Euros, investing in pen-testing solutions becomes a prudent financial decision, offering invaluable protection against devastating losses.

Checking all connected devices and machines

Cloud-based pen-testing solutions can also assess other connected machines and devices

In addition to the low cost and ease of use, he categorises the fact that cloud-based pen-testing solutions can also assess other connected machines and devices in the test as a further advantage.

"If hackers take control of the security cameras on the factory premises, it jeopardises the security of the entire company," says Rainer M. Richter, giving a concrete example of how the call for greater cyber resilience extends far beyond companies' computer systems.

Security vulnerability

What's more, the time between the discovery of a security vulnerability and its exploitation by criminals is becoming increasingly shorter. As a result, companies have less and less time to check whether their computer networks are at risk.

"Given the complexity of today's IT landscapes, companies can't determine in good time whether they are potentially affected by every new vulnerability that emerges, not to mention the enormous costs involved," analyses Rainer M. Richter.

Home working and AI-driving attack scenarios

Companies of all sizes are too careless, warns Rainer M. Richter. Most IT departments have long since lost track of all the potential vulnerabilities in their computer networks, says the security expert.

This is understandable "because computer and network constellations are becoming increasingly complex, and attacks are becoming more sophisticated and faster."

Drivers for cybercrime

As Horizon3.ai has discovered in attack scenarios commissioned by companies using NodeZero™

Rainer M. Richter has identified two main drivers for the rapid growth of cybercrime: the trend towards working from home, which is integrating more and more poorly secured PCs into corporate structures, and the weaponisation of artificial intelligence (AI), which is making cyber-attacks "faster and more dangerous than ever before". 

As Horizon3.ai has discovered in attack scenarios commissioned by companies using its autonomous pentest platform, NodeZero™, companies' defences can usually be breached within minutes.

Open-Source Intelligence (OSINT)

According to the company, NodeZero also uses Open-Source Intelligence (OSINT) to exploit human weaknesses, such as when an employee reveals the name of their dog on social networking sites and uses it as a password for the company network.

"Typically, a single vulnerability is all it takes for attackers to gain access to a company's digital infrastructure," says Horizon3.ai's head of Europe and Asia.

Europe: Epicentre of 2023 cyber threats

Rainer M. Richter is certain that the majority of businesses are well aware of the threat situation, but are relying solely on defencive measures alone.

"Many companies have 20 to 40 separate security systems running at the same time to defend against cyber attacks, but have no way of measuring how well they will work when the company comes under attack," says Rainer M. Richter.

IBM Security X-Force Threat Intelligence Index

He refers to the IBM Security X-Force Threat Intelligence Index 2024, according to which Europe was the most frequently attacked region in the world.

"Given the heightened risk of cyber attacks, stress tests, i.e. penetration tests, are recommended every day, but once a week," advises the expert.

NodeZero

The scanners do find vulnerabilities that should be patched; however, they do not assess the ‘exploitability’

Many companies rely on so-called vulnerability scanners to uncover known vulnerabilities in the software they use, but the feeling of security associated with this is deceptive, says Rainer M. Richter. The scanners do find vulnerabilities that should be patched; however, they do not assess the ‘exploitability’ of such vulnerabilities.

"No IT department is in a position to plug all the security gaps that become known," says Rainer M. Richter. “Rather, it is important to focus on the vulnerabilities and weaknesses that can be exploited by attackers. This focus is only possible by using solutions like NodeZero that are designed to safely attack your own company, because only then will the relevant risks come to light," emphasises Rainer M. Richter.

Cyberattacks with ransomware

The security expert quotes from the BSI status report on IT security in Germany, which states, "The BSI is observing a shift in attacks involving cyberattacks with ransomware: The focus is no longer only on large, solvent companies, but increasingly also on small and medium-sized organisations as well as state institutions and local authorities."

"The citizens of the country are often directly affected by successful cyberattacks on municipal administrations and municipal businesses in particular: this can result in citizen-centred services being unavailable for a period or personal data falling into the hands of criminals."

Stay ahead of the trends on securing physical access control systems through layered cybersecurity practices.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Office security
  • Application security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security cameras
  • Security monitoring system
  • Network cameras
  • Security service
  • Covert Surveillance
  • Testing & Approvals
  • Integration software
  • Cyber security
  • Related links
  • Control Software CCTV software
  • Detection Software CCTV software
  • Drawing Software CCTV software
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Related categories
  • CCTV software
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
About this page

"Uncover your company's security vulnerabilities with autonomous pentesting solutions like NodeZero from Horizon3.ai. Protect against cyber threats and enhance resilience in compliance with stringent EU cyber security regulations."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec