April has been packed with new releases! Last week continued that trend with many new releases supporting a variety of domains such as security, analytics, devops, and many more, as well as more exciting new capabilities within generative AI. If you missed the AWS Summit London 2024, you can now watch the sessions on demand, […]
Category Archives: Blog
As we delve into the realm where artificial intelligence intersects with the ever-evolving landscape of cloud computing, who better to guide our exploration than Drew Firment, the VP of Enterprise Strategies at Pluralsight. With a career steeped in pioneering cloud initiatives, Drew is at the forefront of ushering businesses into the digital future. Having honed […]
In November 2023, the California Privacy Protection Agency (CPPA) released a set of draft regulations on the use of artificial intelligence (AI) and automated decision-making technology (ADMT). The proposed rules are still in development, but organizations may want to pay close attention to their evolution. Because the state is home to many of the world’s […]
In the ever-evolving landscape of cloud infrastructure, creating a customizable and secure virtual private cloud (VPC) environment within a single region has become a necessity for many organizations. The VPC landing zone deployable architectures offers a solution to this need through a set of starting templates that can be quickly adapted to fit your specific […]
A Kubernetes Operator is a method of packaging, deploying, and managing a Kubernetes application. Conceptually, an Operator takes human operational knowledge and encodes it into software that is packaged with the application. This could include how to deploy a complex application, how to handle failing nodes or persistent storage, and how to upgrade an application […]
Foundational models (FMs) are trained on large volumes of data and use billions of parameters. However, in order to answer customers’ questions related to domain-specific private data, they need to reference an authoritative knowledge base outside of the model’s training data sources. This is commonly achieved using a technique known as Retrieval Augmented Generation (RAG). […]
In an insightful interview with CloudTweaks, Nicos Vekiarides, CEO and Co-founder of Attestiv, sheds light on the transformative impact of artificial intelligence (AI) and the escalating challenges posed by deepfake technology. With a background rich in enterprise technology and a keen expertise in digital security, Vekiarides is at the helm of Attestiv, a company that […]
Starting today, you can configure your DNS Firewall to automatically trust all domains in a resolution chain (such as aCNAME, DNAME, or Alias chain). Let’s walk through this in nontechnical terms for those unfamiliar with DNS. Why use DNS Firewall?DNS Firewall provides protection for outbound DNS requests from your private network in the cloud (Amazon […]
Unlocking the full potential of supply chain management has long been a goal for businesses that seek efficiency, resilience and sustainability. In the age of digital transformation, the integration of advanced technologies like generative artificial intelligence brings a new era of innovation and optimization. AI tools help users address queries and resolve alerts by using […]
In an interview with CloudTweaks, Frank Kim, a SANS Fellow and cloud security expert, discusses the critical aspects of safeguarding cloud environments. Frank emphasizes the adoption of zero-trust architectures as essential for protecting high-value data and preventing attackers from moving laterally within network systems. He explains the shared responsibility model, highlighting that cloud service providers […]