.

AWS

4 key takeaways from the AWS Cloud Security Report 2019

This post was originally published here by  gregg rodriguez.Many knowledgeable opinions, four key takeaways, one gathering of pros.The very first AWS re:Inforce conference is upon us.Thousands...

Tips for a Successful AWS re:Inforce 2019

This post was originally published here by gregg rodriguez.AWS re:Inforce 2019 may still be a month away, but if you’re like most IT and...

CSPM for AWS: Monitoring Misconfigurations in IaaS

This post was originally published here by Sophia Zheng .A common scenario we’re seeing today is companies moving their data off-premises and developing custom applications...

TSN acquires AWS Cloud security partner Cloudten for $8.6 million

Cloudten, Australia based AWS Cloud Security partner was acquired by Transaction Solutions International (TSN) for $8.6 million. Highly placed sources say that the acquisition...

Tips for a Successful AWS re:Invent 2018

This post was originally published here by gregg rodriguez.AWS re:invent is less than a month away, but if you’re like most IT and security...

Securing Your AWS Virtual Private Cloud

This post was originally published here by Edward Smith.Amazon Web Services provides highly secure on-demand cloud computing services that serve as the building blocks...

Securing Your AWS IAM Cross-Account Roles and Service Roles

This post was originally published here by Edward Smith.AWS Identity and Access Management (IAM) is a powerful service that helps you control access to...

AWS Access Keys rotation can boost Cloud Security

If an application is not hosted on EC2 instance, then it needs AWS access keys to be accessed. And also all 3rd party applications...

Bitglass Security Spotlight: LinkedIn, Vector, and AWS

This post was originally published here by Jacob Serpa .Here are the top cybersecurity stories of recent weeks:LinkedIn security gap exposes users' dataVector app reveals...

Enhanced security and compliance for AWS

This post was originally published here by casey pechan.Navigating the Amazon Web Services (AWS) Shared Responsibility Model can be tricky, but nonetheless it’s critical...
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!