The What, Why, When, and How of Penetration Testing What is Pen Testing? Penetration testing (pen testing) is a simulation of possible cyberattacks performed by penetration testers (pen testers) with no malicious intention. The main objective of pen testing is to examine the security defenses of the IT infrastructure. Pen testing is performed to… Read more »
Monthly Archives:: August 2020
How to use AWS Certificate Manager with AWS CloudFormation
Automate issuing a public DNS validated certificate Before the ACM can issue a certificate for your site, it must verify that you own or control all of the domain names that you specified in your request. You can choose either email validation or DNS validation when you request a certificate. Previously, when you requested DNS validation, you had to manually add… Read more »