Today, we are launching Amazon S3 dual-layer server-side encryption with keys stored in AWS Key Management Service (DSSE-KMS), a new encryption option in Amazon S3 that applies two layers of encryption to objects when they are uploaded to an Amazon Simple Storage Service (Amazon S3) bucket. DSSE-KMS is designed to meet National Security Agency CNSSP […]
Author Archives: Lucian Systems
When developing a new application or integrating an existing one into a new environment, user authentication and authorization require significant effort to be correctly implemented. In the past, you would have built your own authentication system, but today you can use an external identity provider like Amazon Cognito. Yet, authorization logic is typically implemented in […]
Can security teams keep up with attack surface risks without automated processes? Survey data indicates that the answer is no. In a 2023 survey of IT and cybersecurity professionals, nearly three-quarters (72%) said attack surface discovery alone takes more than 40 person-hours to complete. That does not include the additional time it takes for security […]
Today I’m boarding a plane for Madrid. I will attend the AWS Summit Madrid this Thursday, and I will take Serverlesspresso with me. Serverlesspresso is a demo that we take to events, in where you can learn how to build event-driven architectures with serverless. If you are visiting an AWS Summit, most probably you will […]
Welcome IBM Tech Now, our video web series featuring the latest and greatest news and announcements in the world of technology. Make sure you subscribe to our YouTube channel to be notified every time a new IBM Tech Now video is published. IBM Tech Now: Episode 78 On this episode, we’re covering the following topics: […]
Cryptography is everywhere in our daily lives. If you’re reading this blog, you’re using HTTPS, an extension of HTTP that uses encryption to secure communications. On AWS, multiple services and capabilities help you manage keys and encryption, such as: HSMs are physical devices that securely protect cryptographic operations and the keys used by these operations. […]
In 2030, AI will likely contribute around $15.7 trillion to the global economy. Organizations that invest significantly in AI and leverage practices that accelerate and scale AI development have been shown to gain the highest ROI from AI and the most significant competitive edge. But developing AI solutions is complex – from data engineering and model training to […]
Web browsers and search engines are the primary tools used to navigate and search the internet. However, with the rise of privacy concerns, choosing the right web browser and search engine can have a significant impact on a user’s online privacy. Different browsers and search engines have varying levels of privacy features that can either […]
People analytics is at the center of human resources (HR) strategy and planning. Companies rely heavily on data and analytics to find and retain talent, drive engagement, improve productivity and more across enterprise talent management. However, analytics are only as good as the quality of the data, which must be error-free, trustworthy and transparent. According […]
As organizations continue to expand their digital footprint, new vulnerabilities are constantly emerging that can put them at risk. Among the most prominent new examples is attacks that exploit the growth of application programming interfaces (APIs), which work to connect applications and systems to facilitate the exchange of data. Along with the ease of interaction […]