Amazon Macie – Identify and protect customers private data
Personal or financial information is one of the most sought after goods for cyber criminals. Leaking such information can make a company’s customers vulnerable to
Personal or financial information is one of the most sought after goods for cyber criminals. Leaking such information can make a company’s customers vulnerable to
We are proud to announce that, we, the Alice&Bob.Company achieved the AWS Security Competency. We are one out of three companies holding this status in
Penetration Tests should be an important part of your company’s security strategy. Security experts – often external – try to find gaps in your IT
What happens to security with rise of quantum computers? How does AWS anticipate this revolution? In this article we’ll have a glimpse in to the
Welche Auswirkungen hat ein Quantencomputer auf die IT-Sicherheit? Wie antizipiert AWS diese Revolution? In diesem Artikel werfen wir einen Blick in die Zukunft und zeigen,
Aqua Security offers a SaaS-platform for a number of security-related products for cloud environments. Together with the AWS-build-in-security-tools Aqua enables users to counter the numerous security risks associated with the configuration of AWS environments.
Complex AWS environment tend to have users or roles with more privileges granted than they really need. Finding those users and roles can be a time-consuming activity, so tool-support is needed for this task. CloudTracker is an Open-Source-tool for analyzing users, roles and their granted and used privileges.
As many other conferences worldwide, AWS re:Invent will take place as a free, 3-week virtual conference this year from Nov. 30 until December 18. Attendees have the choice between keynotes, sessions and trainings in three different time zones.
Complexity defeats any security strategy, but good management utilities can help. Regain control with a multi-account strategy – based on established AWS best practices.
When talking about cloud security, and more precisely about security automation, being familiar with AWS Config is a must.