Introducing Agent Commander
Detect AI Risk. Protect AI Use. Undo AI Mistakes. AI agents are moving quickly from experimentation to operational infrastructure. In many organizations, that growth is outpacing the ability to control…
Detect AI Risk. Protect AI Use. Undo AI Mistakes. AI agents are moving quickly from experimentation to operational infrastructure. In many organizations, that growth is outpacing the ability to control…
Last week, my team met many developers at Developer Week in San Jose. My colleague, Vinicius Senger delivered a great keynote about renascent software—a new way of building and evolving…
For nearly a decade, Veeam has set the standard for innovation in Microsoft 365 backup and data protection. Veeam’s unwavering commitment to data resilience and security is now proven by…
TL;DR Model Context Protocol (MCP) is a standard way for an AI app/agent to access tools, resources, and prompts exposed by an MCP server. The big new security risk MCP…
Today, we’re announcing the general availability of Amazon Elastic Compute Cloud (Amazon EC2) Hpc8a instances, a new high performance computing (HPC) optimized instance type powered by latest 5th Generation AMD…
Since we launched Amazon Nova customization in Amazon SageMaker AI at AWS NY Summit 2025, customers have been asking for the same capabilities with Amazon Nova as they do when…
I joined AWS in 2021, and since then I’ve watched the Amazon Elastic Compute Cloud (Amazon EC2) instance family grow at a pace that still surprises me. From AWS Graviton-powered…
Here are the notable launches and updates from last week that can help you build, scale, and innovate on AWS. Last week’s launches Here are the launches that got my…
Why This Matters Now Enterprises are moving beyond chatbots into LLM-powered assistants that can: Retrieve information from internal repositories (RAG). Summarize sensitive content. Create tickets and run workflows. And most…
TL;DR — Key Takeaways Global frameworks like DORA and CIRCIA now make resilience, backup testing, and incident reporting mandatory for regulated organizations. Meeting regulatory compliance requirements demands a baseline security posture, encryption, access control, and…