fbpx

AWS is excited to announce a new eBook, 5 Keys to Secure Enterprise Messaging. The new eBook includes best practices for addressing the security and compliance risks associated with messaging apps. <table width=”100%”> <tbody> <tr> <td width=”100%”>An estimated 3.09 billion mobile phone users access messaging apps to communicate, and this figure is projected to grow […]

Read more

The AWS Blueprint for Ransomware Defense, a new resource that business and public sector organizations can use to put preventative measures in place to protect data from ransom malware events, is introduced by Amazon Web Services( AWS ) in this post. AWS services and features are mapped to various components of the Center for Internet […]

Read more

Amazon Web Services (AWS) has re-published the whitepaper Architecting for PCI DSS Scoping and Segmentation on AWS to provide guidance on how to properly define the scope of your Payment Card Industry (PCI) Data Security Standard (DSS) workloads that are running in the AWS Cloud. The whitepaper has been refreshed to include updated AWS best […]

Read more

<p>In the AWS Security Profile series, we interview <a href=”https://aws.amazon.com/” target=”_blank” rel=”noopener”>Amazon Web Services (AWS)</a> thought leaders who help keep our customers safe and secure. This interview features Ritesh Desai, General Manager, AWS Secrets Manager, <a href=”https://reinforce.awsevents.com/” target=”_blank” rel=”noopener”>and re:Inforce 2023</a> session speaker, who shares thoughts on data protection, cloud security, secrets management, and more.</p> […]

Read more

Amazon Security Lake automatically centralizes security data from both cloud and on-premises sources into a purpose-built data lake stored on a particular AWS delegated administrator account for Amazon Security Lake. <p>In this blog post, I will show you how to configure your Amazon Security Lake solution with cloud activity data from <a href=”https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/activity-log?tabs=powershell” target=”_blank” rel=”noopener”>Microsoft […]

Read more

AWS Best Practices in Backup Techniques are emphasized. Your cloud-hosted information can be affected by any number of information loss or interruption situations, just like in on-premises settings, with cyberthreats like malware continuing to top the list. Malware attacks are spreading at an alarming rate, with storage repositories taking the lead as the main goal. […]

Read more