Better Threat Detection with CloudWatch Logs and Generative AI
In the previous parts of this series, I set up a base architecture for AWS Threat Detection and Management, deployed AWS WAF, AWS Shield Advanced, GuardDuty, Inspector, and AWS Config. …
Developer Advocate | CCIES #23837 | Security Specialist
In the previous parts of this series, I set up a base architecture for AWS Threat Detection and Management, deployed AWS WAF, AWS Shield Advanced, GuardDuty, Inspector, and AWS Config. …
Introduction Preparing for technical exams, such as the AWS Solutions Architect Associate certification, can be a daunting task. The challenge is not only mastering the content but also navigating the …
Welcome to the next article in our series on Threat Detection and Management on AWS. This is a multi-part series so I recommend following along in order to get the …
Here’s a revised title that is under 60 characters: Boost Threat Detection with Amazon GuardDuty & Inspector While AWS WAF and AWS Shield are powerful tools for web application security, …
Welcome to the 25th edition of the Securing the Cloud Newsletter! In this issue, we dive into the latest trends and insights in cloud security, explore career development opportunities, and …
Infrastructure protection on AWS is crucial, especially with the ever-evolving threat landscape. On AWS, there are various infrastructure protection services that can help you secure your cloud environment. Some of …
In the rapidly evolving landscape of cloud computing, securing access to resources stands as a top concern for organizations worldwide. AWS addresses this necessity through its what’s know as the …
In the ever-evolving digital landscape, cloud computing has become an integral part of modern business operations. As organizations embrace the flexibility and scalability of cloud platforms like Amazon Web Services …
Starting a career in cloud security can seem like navigating through a labyrinth of technologies, best practices, and ever-evolving threats. However, the path becomes clearer and more navigable when you …
It’s no secret that protecting our online information is more important than ever. There are several methods that bad actors employ to gain access to our data and our resources. …