I would like to hear some opinions about pentesting in the cloud. How it is different, what are the approaches, what would you advise to an inexperienced (or experienced!) pentester. Real-world examples will be most appreciated.
Last edited by PenTestMag
on Wed Jun 22, 2011 8:54 am, edited 1 time in total.