Today, we’re announcing the general availability of a new capability that integrates AWS Backup logically air-gapped vaults with Multi-party approval to provide access to your backups even when your AWS account is inaccessible due to inadvertent or malicious events. AWS Backup is a fully managed service that centralizes and automates data protection across AWS services […]
Category Archives: Blog
Today, I’m happy to announce AWS Shield network security director (preview), a capability that simplifies identification of configuration issues related to threats such as SQL injections and distributed denial of service (DDoS) events, and proposes remediations. This feature identifies and analyzes network resources, connections, and configurations. It compares them against AWS best practices to create […]
Today, we’re announcing a new simplified onboarding experience for Amazon CloudFront that developers can use to accelerate and secure their web applications in seconds. This new experience, along with improvements to the AWS WAF console experience, makes it easier than ever for developers to configure content delivery and security services without requiring deep technical expertise. […]
Today, we’re announcing exportable public SSL/TLS certificates from AWS Certificate Manager (ACM). Prior to this launch, you can issue your public certificates or import certificates issued by third-party certificate authorities (CAs) at no additional cost, and deploy them with integrated AWS services such as Elastic Load Balancing (ELB), Amazon CloudFront distribution, and Amazon API Gateway. […]
Today, we’re announcing a new capability in AWS IAM Access Analyzer that helps security teams verify which AWS Identity and Access Management (IAM) roles and users have access to their critical AWS resources. This new feature provides comprehensive visibility into access granted from within your Amazon Web Services (AWS) organization, complementing the existing external access […]
In today’s rapidly evolving threat landscape, runtime security has become a critical frontier in cloud-native defense. To help accelerate innovation in this space, Upwind has appointed veteran cybersecurity leader Rinki Sethi as its new Chief Security Officer. With a proven track record at organizations like Twitter, IBM, and Rubrik, Rinki brings deep expertise in building […]
Today marks the start of AWS re:Inforce 2025, where security professionals are gathering for three days of technical learning sessions, workshops, and demonstrations. This security-focused conference brings together AWS security specialists who build and maintain the services that organizations rely on for their cloud security needs. AWS Chief Information Security Officer (CISO) Amy Herzog will […]
Ransomware is predicted to cost victims around $275 billion annually by 2031, according to Cybersecurity Ventures. Yet, despite this growing threat, most organizations’ data protection strategies remain narrowly focused on mission-critical systems—typically stored as block data—while neglecting one of the most vulnerable and expansive targets: unstructured file data. This is because it is way too expensive […]
Editor’s Note: This previously published article has been updated in 2025 to reflect current ERP deployment trends, technology advances, and evolving industry best practices. You already know how ERP deployment can streamline processes across your supply chain and drive business efficiency. But one of the most critical decisions today is not if you should implement […]
The last several years have seen a dramatic shift in how businesses operate, including remote work becoming a crucial part of the workplace strategy. Whether fully remote or hybrid, most companies employing knowledge workers now offer some form of flexible work. In fact, a recent survey found that 84% of IT professionals report their organizations support remote work in some […]