Uncategorized

Amazon GuardDuty expands Extended Threat Detection coverage to Amazon EKS clusters

Today, I’m happy to announce Amazon GuardDuty Extended Threat Detection with expanded coverage for Amazon Elastic Kubernetes Service (Amazon EKS), building upon the capabilities we introduced in our AWS re:Invent 2024 announcement of Amazon GuardDuty Extended Threat Detection: AI/ML attack sequence identification for enhanced cloud security. Security teams managing Kubernetes workloads often struggle to detect …

Amazon GuardDuty expands Extended Threat Detection coverage to Amazon EKS clusters Read More »

Unify your security with the new AWS Security Hub for risk prioritization and response at scale (Preview)

AWS Security Hub has been a central place for you to view and aggregate security alerts and compliance status across Amazon Web Services (AWS) accounts. Today, we are announcing the preview release of the new AWS Security Hub which offers additional correlation, contextualization, and visualization capabilities. This helps you prioritize critical security issues, respond at scale …

Unify your security with the new AWS Security Hub for risk prioritization and response at scale (Preview) Read More »

AWS Backup adds new Multi-party approval for logically air-gapped vaults

Today, we’re announcing the general availability of a new capability that integrates AWS Backup logically air-gapped vaults with Multi-party approval to provide access to your backups even when your AWS account is inaccessible due to inadvertent or malicious events. AWS Backup is a fully managed service that centralizes and automates data protection across AWS services …

AWS Backup adds new Multi-party approval for logically air-gapped vaults Read More »

New AWS Shield feature discovers network security issues before they can be exploited (Preview)

Today, I’m happy to announce AWS Shield network security director (preview), a capability that simplifies identification of configuration issues related to threats such as SQL injections and distributed denial of service (DDoS) events, and proposes remediations. This feature identifies and analyzes network resources, connections, and configurations. It compares them against AWS best practices to create …

New AWS Shield feature discovers network security issues before they can be exploited (Preview) Read More »

Amazon CloudFront simplifies web application delivery and security with new user-friendly interface

Today, we’re announcing a new simplified onboarding experience for Amazon CloudFront that developers can use to accelerate and secure their web applications in seconds. This new experience, along with improvements to the AWS WAF console experience, makes it easier than ever for developers to configure content delivery and security services without requiring deep technical expertise. …

Amazon CloudFront simplifies web application delivery and security with new user-friendly interface Read More »

Verify internal access to critical AWS resources with new IAM Access Analyzer capabilities

Today, we’re announcing a new capability in AWS IAM Access Analyzer that helps security teams verify which AWS Identity and Access Management (IAM) roles and users have access to their critical AWS resources. This new feature provides comprehensive visibility into access granted from within your Amazon Web Services (AWS) organization, complementing the existing external access …

Verify internal access to critical AWS resources with new IAM Access Analyzer capabilities Read More »

AWS Certificate Manager introduces exportable public SSL/TLS certificates to use anywhere

Today, we’re announcing exportable public SSL/TLS certificates from AWS Certificate Manager (ACM). Prior to this launch, you can issue your public certificates or import certificates issued by third-party certificate authorities (CAs) at no additional cost, and deploy them with integrated AWS services such as Elastic Load Balancing (ELB), Amazon CloudFront distribution, and Amazon API Gateway. …

AWS Certificate Manager introduces exportable public SSL/TLS certificates to use anywhere Read More »

AWS Weekly Roundup: AWS re:Inforce 2025, AWS WAF, AWS Control Tower, and more (June 16, 2025)

Today marks the start of AWS re:Inforce 2025, where security professionals are gathering for three days of technical learning sessions, workshops, and demonstrations. This security-focused conference brings together AWS security specialists who build and maintain the services that organizations rely on for their cloud security needs. AWS Chief Information Security Officer (CISO) Amy Herzog will …

AWS Weekly Roundup: AWS re:Inforce 2025, AWS WAF, AWS Control Tower, and more (June 16, 2025) Read More »

SaaS Backup Solutions: Protect Microsoft 365, Entra ID, and Salesforce

The Need for SaaS Backup As organizations increasingly adopt and rely on Software as a Service (SaaS) for business-critical functions, it’s essential that IT operations and security professionals scrutinize the availability and integrity of the data within these posted applications. Solutions like Microsoft 365, Entra ID, and Salesforce keep your data secure, and provide recycle …

SaaS Backup Solutions: Protect Microsoft 365, Entra ID, and Salesforce Read More »

Encryption in Real Time: What Really Happens During a Ransomware Attack

It starts like any other morning — except for the IT admin, who logs in first. You check the monitoring dashboard and see a few alerts: elevated CPU usage, a couple of failed logins, then a string of disconnected endpoints. At first, it looks like routine noise. Maybe a patch failed overnight. Maybe a script …

Encryption in Real Time: What Really Happens During a Ransomware Attack Read More »

Scroll to Top