The What, Why, When, and How of Penetration Testing

Posted filed under Uncategorized.

The What, Why, When, and How of Penetration Testing   What is Pen Testing? Penetration testing (pen testing) is a simulation of possible cyberattacks performed by penetration testers (pen testers) with no malicious intention. The main objective of pen testing is to examine the security defenses of the IT infrastructure. Pen testing is performed to… Read more »

How to use AWS Certificate Manager with AWS CloudFormation

Posted filed under Amazon AWS.

Automate issuing a public DNS validated certificate Before the ACM can issue a certificate for your site, it must verify that you own or control all of the domain names that you specified in your request. You can choose either email validation or DNS validation when you request a certificate. Previously, when you requested DNS validation, you had to manually add… Read more »