Category Archives: Blog

AWS Backup adds new Multi-party approval for logically air-gapped vaults

Today, we’re announcing the general availability of a new capability that integrates AWS Backup logically air-gapped vaults with Multi-party approval to provide access to your backups even when your AWS account is inaccessible due to inadvertent or malicious events. AWS Backup is a fully managed service that centralizes and automates data protection across AWS services […]

New AWS Shield feature discovers network security issues before they can be exploited (Preview)

Today, I’m happy to announce AWS Shield network security director (preview), a capability that simplifies identification of configuration issues related to threats such as SQL injections and distributed denial of service (DDoS) events, and proposes remediations. This feature identifies and analyzes network resources, connections, and configurations. It compares them against AWS best practices to create […]

Amazon CloudFront simplifies web application delivery and security with new user-friendly interface

Today, we’re announcing a new simplified onboarding experience for Amazon CloudFront that developers can use to accelerate and secure their web applications in seconds. This new experience, along with improvements to the AWS WAF console experience, makes it easier than ever for developers to configure content delivery and security services without requiring deep technical expertise. […]

AWS Certificate Manager introduces exportable public SSL/TLS certificates to use anywhere

Today, we’re announcing exportable public SSL/TLS certificates from AWS Certificate Manager (ACM). Prior to this launch, you can issue your public certificates or import certificates issued by third-party certificate authorities (CAs) at no additional cost, and deploy them with integrated AWS services such as Elastic Load Balancing (ELB), Amazon CloudFront distribution, and Amazon API Gateway. […]

Verify internal access to critical AWS resources with new IAM Access Analyzer capabilities

Today, we’re announcing a new capability in AWS IAM Access Analyzer that helps security teams verify which AWS Identity and Access Management (IAM) roles and users have access to their critical AWS resources. This new feature provides comprehensive visibility into access granted from within your Amazon Web Services (AWS) organization, complementing the existing external access […]

Runtime Security Reimagined: A Conversation with Rinki Sethi, CSO of Upwind

In today’s rapidly evolving threat landscape, runtime security has become a critical frontier in cloud-native defense. To help accelerate innovation in this space, Upwind has appointed veteran cybersecurity leader Rinki Sethi as its new Chief Security Officer. With a proven track record at organizations like Twitter, IBM, and Rubrik, Rinki brings deep expertise in building […]

AWS Weekly Roundup: AWS re:Inforce 2025, AWS WAF, AWS Control Tower, and more (June 16, 2025)

Today marks the start of AWS re:Inforce 2025, where security professionals are gathering for three days of technical learning sessions, workshops, and demonstrations. This security-focused conference brings together AWS security specialists who build and maintain the services that organizations rely on for their cloud security needs. AWS Chief Information Security Officer (CISO) Amy Herzog will […]

File Data: The Hidden Ransomware Threat Costing Enterprises Millions 

Ransomware is predicted to cost victims around $275 billion annually by 2031, according to Cybersecurity Ventures. Yet, despite this growing threat, most organizations’ data protection strategies remain narrowly focused on mission-critical systems—typically stored as block data—while neglecting one of the most vulnerable and expansive targets: unstructured file data. This is because it is way too expensive […]

ERP Deployment in 2025: Comparing Cloud, Hybrid, and On-Premise Solutions

Editor’s Note: This previously published article has been updated in 2025 to reflect current ERP deployment trends, technology advances, and evolving industry best practices. You already know how ERP deployment can streamline processes across your supply chain and drive business efficiency. But one of the most critical decisions today is not if you should implement […]

Security Threats and Public Cloud Growth Drive IT Retooling

The last several years have seen a dramatic shift in how businesses operate, including remote work becoming a crucial part of the workplace strategy. Whether fully remote or hybrid, most companies employing knowledge workers now offer some form of flexible work. In fact, a recent survey found that 84% of IT professionals report their organizations support remote work in some […]