Pen Testing
- Targets internet-facing assets like websites, APIs, or mail servers.
- Simulates a hacker attacking from outside your network.
Focuses on risks within your network, like compromised credentials or insider threats
Secures web apps against OWASP Top Ten threats, such as SQL injection or cross-site scripting (XSS)
Assesses cloud environments (example: AWS, GCP, Azure) for misconfigurations or exposed APIs