Monday, 31 January 2022

An Introduction to Penetration Testing as Code Framework (PAC) Video Series

In today’s world, businesses are under constant attack from cybercriminals. To protect themselves, they need to have a plan in place that includes the use of penetration testers. These experts can help find and exploit vulnerabilities in systems, but the process can be time-consuming and expensive. The future of offensive security lies in automation, and that is where penetration testing as code comes into play. In a series of videos, we are discussing how this new approach can help you create the next generation of security that is both efficient and cost-effective.



These are the topics we are covering in this series of videos:

  • Vulnerability assessment and penetration testing
  • Challenges with manual vulnerability assessments and manual penetration testing
  • Automated penetration testing to the rescue
  • Automated Pentesting vs DAST
  • Automated pentesting – a perfect fit for cloud applications at scale
  • Why security validation as code?
  • Offensive Security at scale
  • Build attack ready cloud with shift-left
  • Stop the game of false positives
  • Unify the cloud engineering and security toolsets
  • Future of offensive security in the cloud
  • Seamless discovery
  • Wrap up

Check this page regularly and we update it with the links to new videos when they become available!


Tuesday, 25 January 2022

How to use Prancer VSCode Extension for IaC templates


Prancer VSCode Extension helps developers write more secure infrastructure code for the cloud.

Prancer applies best practices and security configurations to the infrastructure code right from the development environment. VSCode Extension for IaC Static Code Analysis is the first layer of defense in Shift Left strategy!

Security Scanner helps to identify potential security issues with your code. It includes a set of linters and scanners, which are able to find vulnerabilities in your IaC Configuration Files, discover insecure configurations, for example for AWS EC2, ECS, S3, and other resources. Then it verifies that all misconfigurations have been fixed and remediated by running the remediation function on the code.

To understand more, watch this video: