Cloud Detection and Response Survey Report

GET THE REPORT
Illustration Cloud

P0 Labs: Helping stay ahead of cloud adversaries

As organizations continue to accelerate the shift to cloud, adversaries are following. Over the past ten (10) years I have had the opportunity to lead some of the largest and most impactful public and private Incident Response (IR) engagements at Mandiant. In recent times, it is hard to come across an investigation that does not contain at least some cloud component, and many that take place only in the Cloud.

Unfortunately for most organizations, expertise and tooling around cloud security has not advanced at the same rate as cloud adoption. Additionally, cloud environments are becoming increasingly complex. At Permiso, we aim to narrow the gap by providing Identity focused Cloud Detection and Response.

For p0 Labs, we have compiled a team of industry leading experts in IR and Red Teaming. With our combined experience, the focus will be to convert our front line IR knowledge into runtime detection on the Permiso platform, identifying intrusions in client environments, and stay ahead of adversaries attacking cloud.

We are passionate about finding evil in the cloud and teaching others how to do so as well. Keep an eye on our blog for articles related to what we are observing and researching!

Thank you,

Ian Ahl

VP of p0 Labs

Illustration Cloud

Related Articles

Permiso 2022 - End of Year Observations

In 2022, Permiso's Cloud Detection & Response platform detected a multitude of different security events across client cloud infrastructure environments. In all cases, the detected suspicious and malicious behavior inside of their cloud environments

Achieving SOC 2 Type 1 Certification - Helping companies feel more secure about Permiso while we help them secure their public cloud

We're excited to announce that Permiso is now SOC 2 Type I certified. This certification signifies that an independent third-party auditor has validated the design of our security program controls against an established set of Trust Service

Cloud vendor supply chain risk - Forecast: Foggy with a chance of thunderstorms

Attackers are increasingly taking advantage of trusted vendor relationships to perform software and service based supply chain attacks. As cloud adoption continues to grow, we will see sophisticated threat actors like APT29 increase targeting of

View more posts