Please turn on your JavaScript for this page to function normally.
HNS
IBM partners with AWS to optimize data management for AI workloads

IBM announced that it has been working with AWS on the general availability of Amazon Relational Database Service (Amazon RDS) for Db2, a fully managed cloud offering designed …

AWS
Amazon One Enterprise palm-based identity service improves security of physical spaces, digital assets

AWS announced Amazon One Enterprise, a palm-based identity service for comprehensive and easy-to-use authentication that improves organizational security and helps prevent …

HNS
Trellix accelerates threat detection and response with GenAI capabilities

Trellix announced its generative artificial intelligence (GenAI) capabilities, built on Amazon Bedrock and supported by Trellix Advanced Research Center. Amazon Bedrock is a …

AWS Kill Switch
AWS Kill Switch: Open-source incident response tool

AWS Kill Switch is an open-source incident response tool for quickly locking down AWS accounts and IAM roles during a security incident. The solution includes a Lambda …

free AI and GenAI courses from AWS
8 free AI and GenAI courses from AWS

Amazon’s AI Ready initiative aims to provide free AI skills training and education to 2 million people globally by 2025. “Artificial intelligence is the most …

corporate cybersecurity blogs
10 corporate cybersecurity blogs worth your time

In this article, we’ve curated a list of insightful corporate cybersecurity blogs that provide analysis and actionable advice to help you keep your company’s …

Sumo Logic
Sumo Logic discloses potential breach via compromised AWS credential

Cloud-native big data and security analytics firm Sumo Logic is investigating a potential security incident within their platform, the company revealed on Tuesday. The Sumo …

AWS
AWS European Sovereign Cloud allows customers to keep all metadata in the EU

AWS announced it will launch the AWS European Sovereign Cloud, a new, independent cloud for Europe designed to help public sector customers and those in highly regulated …

Jupyter
Jupyter Notebooks targeted by cryptojackers

Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. What are …

CVE-2023-44487
Dangerous vulnerability can be exploited to carry out massive DDoS attacks (CVE-2023-44487)

Cloudflare, Google, and Amazon AWS revealed that a zero-day vulnerability in the HTTP/2 protocol has been used to mount massive, high-volume DDoS attacks, which they dubbed …

AWS keys
Amazon: AWS root accounts must have MFA enabled

Amazon wants to make it more difficult for attackers to compromise Amazon Web Services (AWS) root accounts, by requiring those account holders to enable multi-factor …

HNS
Duality Technologies joins AWS Partner Network to provide secure data collaboration

Duality Technologies has joined the Amazon Web Services (AWS) Partner Network (APN) and launched its secure data collaboration platform in AWS Marketplace. Duality …

Don't miss

Cybersecurity news