New & Notable
AWS security News
April 01, 2020
AWS has released Amazon Detective, a managed threat hunting service that generates visualizations out of log data from native Amazon Web Services.
December 31, 2019
It's almost impossible to keep up with all the services and capabilities AWS trots out for its annual re:Invent conference. Catch up on Amazon cloud updates you missed with this AWS re:Invent recap.
August 05, 2019
Infosec pros warn of server-side request forgery vulnerabilities in AWS following the Capital One data breach, which may have revealed an issue regarding the AWS metadata service.
June 28, 2019
Robust data coupled with the power of metaphors can help cybersecurity teams tell stories that get the rest of the business on board with new security initiatives and prepare for security crises.
AWS security Get Started
Bring yourself up to speed with our introductory content
Traffic mirroring is a feature for Amazon Virtual Private Cloud (Amazon VPC). The feature is used to monitor the network-level traffic of workloads. Continue Reading
In this book excerpt from "AWS Certified SysOps Administrator Associate All-in-One Exam Guide," review the best practices for OS and application security on AWS. Continue Reading
Get started with this guide to AWS Config rules. Learn how to customize AWS Config managed rules with CloudFormation and create new rules with AWS Lambda. Continue Reading
Evaluate AWS security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Protect your AWS cloud environment with these Amazon firewall services. Learn how security groups and network ACLs work, along with other key AWS firewall options. Continue Reading
Explore what AWS' recent IT purchases say about the cloud vendor's overall acquisition strategy and why it likes to make the smaller deals instead of any big splash. Continue Reading
The WebSockets vs. HTTP debate has changed for AWS users. With WebSocket support for Amazon API Gateway, users can build serverless applications that can communicate instantaneously. Continue Reading
Manage AWS security
Learn to apply best practices and optimize your operations.
To best secure network access, AWS administrators need to create rules for network resources. Learn how to implement Amazon VPC security best practices in this book excerpt. Continue Reading
Securing network access in AWS requires the right rules to be in place. Learn more about Virtual Private Clouds and how implementing them can prevent common cloud security attacks. Continue Reading
Cloud security is an ongoing process that demands regular checks for potential vulnerabilities. Use tools such as Amazon Inspector to perform frequent and thorough cloud security assessments. Continue Reading
Problem Solve AWS security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
AWS has flooded its catalog with services, but enterprises still struggle with the gaps that remain. Find out which pain points cloud experts want AWS to address at re:Invent this year. Continue Reading
Get a cloud expert's take on the technical factors involved in the Capital One data breach that exposed sensitive data of millions of the bank's customers. Continue Reading
Don't want to be on the nightly news? Protect sensitive data with cloud security best practices gleaned from what Capital One did wrong -- and what it got right -- during the breach. Continue Reading