AWS security
Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster
The post Visualize Network Activity in Amazon Virtual Private Clouds to Spot Threats Faster appeared first on Delta Risk ...
AWS re:Inforce 2019 Recap: A Look Back at the First AWS Security Show
The last day of the first AWS re:Inforce conference has wrapped up and it’s time to take the lessons we learned back to the office and put them into practice. In this ...
AWS re:Inforce 2019 — Day 1 Recap
Day 1 of AWS re:Inforce 2019 — the first-ever AWS conference dedicated entirely to security — has wound down, and Day 2 is already underway, but we wanted to provide a quick ...
Your Guide to AWS re:Inforce 2019
AWS re:Inforce 2019 | June 25–26, 2019 | Boston, MA Attending cloud security conferences is critical for cloud security professionals, and AWS is stepping up to the plate with AWS re:Inforce — ...
7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider
The lack of a common framework for assessing Cloud Service Providers (CSPs) combined with the fact that no two CSPs are the same can complicate the process of selecting one that’s right ...
How to Track Agent-Based User Activity
More often than not we’ll need to go beyond a Severity 1 alert to figure out what a user (including a potentially malicious attacker) was doing on a system. Host events in ...
Transforming Alert Fatigue Into Proactive Security Management
In a recent study, 72% of CISOs stated that their teams are facing alert fatigue, while 82% of respondents to a Threat Stack survey indicated that alert fatigue is having a negative ...
Leveraging Threat Stack’s Out-of-the-Box Rulesets and Single View for Managing Multiple AWS Accounts
Increasingly, AWS users are leveraging multiple accounts to manage their infrastructure. While doing so is a recommended best practice that enables users to achieve the highest levels of resource and security isolation ...
AWS Security Readiness Checklist
This AWS Security Readiness Checklist is intended to help organizations evaluate their applications and systems before deployment on AWS. This evaluation is based on a series of best practices and is built ...
AWS Security Groups: What They Are and How to Get the Most Out of Them
AWS Security Groups are a flexible tool to help you secure your Amazon EC2 instances. AWS Security Groups are just one of several tools AWS offers to help you secure your cloud ...