|
|||||
|
|||||
Although Teri has helped some of the largest organizations in the world with security, her heart lies with helping small and medium sized businesses and startups, because a breach of her own systems while running an e-commerce consulting startup many years ago is what got her into cybersecurity. You can read that story in her book or in her blog. 2nd Sight Lab also publishes novel security research on our blog and GitHub account. See the link below. Contact Teri Radichel on LinkedIn for more information about how a penetration test can help your company find security gaps before attackers do and how our penetration test helps you not only find the problems but understand how to fix them. |
Cloud penetration testing refers to trying to hack into cloud resources to access data or perform unwanted actions
in a customer's cloud environment. Various cloud misconfigurations allow us to do that. In addition to trying
to exploit cloud resources, we perform scans to find security gaps and problems that could lead to a
breach or security incident.
Attacking the cloud platform itself is usually limited unless there is a blatant misconfiguration. Most of the time, infiltration of a cloud platform is by way of phishing and stolen developer credentials, or application flaws in cloud-hosted applications. We always address those two items on cloud penetration test via the following methods:
We use a combination of open source, commercial, and custom tools. Commercial and open source tools include but are not limited to:
2nd Sight Lab doesn't just leave you hanging with a big list of findings to review. We offer guidance for fixing those findings in our report and can meet with your team after the test virtually to explain any findings that are unclear or fix any findings that have mitigating factors. © 2018 2nd Sight Lab, LLC | Savannah, Georgia |
Teri Radichel, CEO of 2nd Sight Lab, has spoken at some of the largest cybersecurity,
application security, and cloud conferences around the world. Listen to some of the
presentations or view the slide decks below. Click below to hire a speaker for your event.
View cybersecurity presentations on Youtube: View presentation slides for past cybersecurity and cloud security presentations. |