Tag: Amazon
-
TLS inspection configuration for encrypted egress traffic and AWS Network Firewall
AWS Security Blog TLS inspection configuration for encrypted egress traffic and AWS Network Firewall In the evolving landscape of network …
-
How to generate security findings to help your security team with incident response simulations
Continually reviewing your organization’s incident response capabilities can be challenging without a mechanism to create security …
-
Explore cloud security in the age of generative AI at AWS re:Inforce 2024
As the Chief Information Security Officer (CISO) at AWS, I’m personally committed to helping security teams of all skill levels and sizes …
-
Securing generative AI: data, compliance, and privacy considerations
Broadly speaking, we can classify the use cases in the scoping matrix into two categories: prebuilt generative AI applications (Scopes 1 …
-
How to use OAuth 2.0 in Amazon Cognito: Learn about the different OAuth 2.0 grants
AWS Security Blog How to use OAuth 2.0 in Amazon Cognito: Learn about the different OAuth 2.0 grants Implementing authentication and …
-
AWS Reserved Instance Management – Is Automation the Key?
Reserved Instances (RIs) are a pricing model that offers cloud users discounts in return for their long-term commitment to EC2, RDS, and …
-
AWS zero trust: A CISO’s path to improved cloud visibility & control
EXECUTIVE SUMMARY: It’s undisputed — the cloud has transformed how organizations …
-
One-Click AWS Vulnerability Let Attackers Takeover User’s Web Management Panel
Tenable Research has identified a critical vulnerability within the AWS Managed Workflows for Apache Airflow (MWAA) service, which they …
-
AWS fixes 1-click Apache Airflow session hijack flaw
Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA), a popular service for running Apache Airflow workflows on the cloud, …
-
AWS fixes 1-click account takeover flaw exposing cloud services to XSS risk
Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA), a popular service for running Apache Airflow workflows on the cloud, …
-
Securing generative AI: Applying relevant security controls
Scope 1: Consumer applications In this scope, members of your staff are using a consumer-oriented application typically delivered as a …
-
Hackers Abuse Amazon & GitHub to Deploy Java-based Malware
Hackers target these platforms due to their hosting of valuable resources and data. For financial gain or some other bad motive, the …
●●●