Docker: Container Breakout

The term “container breakout” is used to indicate a situation in which a…


Docker host and core security

As the Docker ecosystem grows up and stabilizes, the security topics of this…


The specificity of a pentest from System Admins

Each pentest is unique in its own way (but the technique can be same). Many…


Pentest Philosophy

Don’t think that pentest will show all the problems and the result will be an…


Requirements for a pentester

The requirements for such a specialist, of course, are different from the…


Soft skills of a pentester

Pentester is not just a tester, so it’s better not to go this professional area…


Who are pentesters and what they actually do?

What is “penetration” and why should it be tested? In this article we will try…


Amazon Cloud Watch & AWS Identity and Access Management (IAM)

Amazon Cloud Watch Cloud Watch is used to monitor the health / state of mainly…