Skip to content

Commit

Permalink
add SCV-Security validator profile
Browse files Browse the repository at this point in the history
  • Loading branch information
vini committed Jun 1, 2022
1 parent 73f4a45 commit a63e2ac
Show file tree
Hide file tree
Showing 3 changed files with 53 additions and 1 deletion.
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
---
Moniker: SCV-Security
Validator: terravaloper10c04ysz9uznx2mkenuk3j3esjczyqh0j783nzt
Email: [email protected]
Website: https://scv.services
Twitter: @scv_security
---

![SCV-Security](logo.png)

## SCV Security

SCV contributes directly to the security posture of Terra’s ecosystem through open-source initiatives and researching.

Our primary focus is to deliver holistic, comprehensive security assurance by employing offensive hacking and pen-testing alongside regular audits.

SCV has more than 15 years of experience in the cyber security industry and have been involved in the hacker culture for much longer.

We recruit the best talent we can find.

## Services Offering - Offensive Security Assurance

- **Advanced Penetration Testing**
- Ensure the underlying application and infrastructure are secure against vulnerabilities and threats.
- **Adversary Simulation (Red Team)**
- A highly targeted attack simulation designed to test all parties, providing the organisation with a realistic simulation to learn from, like "live fire" exercises. High value targets are identified pre-engagement and the Red Team engages using attacks crafted specifically for the engagement.
- **Cloud Security Assessment**
- Review of cloud environments and their configuration against best security practices, to minimise the attack surface.
- **Security Code Review**
- Identifying security related weaknesses in source code, ideally before deployment and before attackers get the opportunity.
- **Social Engineering**
- We simulate an active attack or execute its impact to test the security awareness of an individual or a group of people. For example, Phishing techniques.
- **DevSecOps and Automation**
- Ensure that the CI/CD and other automation is configured securely, to best practices, and implement automated security testing within the pipeline.
- **OSINT**
- Finding identifying information about the organisation and any team members. Particularly information that could be misused. Anonymity could be important, and OSINT tries to break anonymity by connecting all the dots.

## Contact Us

The best way to have a quick answer is: [email protected] or [@scv_security](https://twitter.com/scv_security)

### Website

https://twitter.com/scv_security
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
{
"contact": {
"email": "[email protected]",
"telegram": "@unl1k3ly",
"twitter": "https://twitter.com/scv_security",
"keybase": "https://keybase.io/scvsecurity"
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"contact": {
"email": "[email protected]",
"telegram": "@unl1k3ly",
"twitter": "https://twitter.com/TerraSCV",
"twitter": "https://twitter.com/scv_security",
"keybase": "https://keybase.io/scvsecurity"
}
}

0 comments on commit a63e2ac

Please sign in to comment.