The log4j security vulnerability
Update 15th Dec 2021: As the current situation is evolving security researchers noted that the presented quick fixes to mitigate the current log4j security vulnerability
Update 15th Dec 2021: As the current situation is evolving security researchers noted that the presented quick fixes to mitigate the current log4j security vulnerability
Aqua Security offers a SaaS-platform for a number of security-related products for cloud environments. Together with the AWS-build-in-security-tools Aqua enables users to counter the numerous security risks associated with the configuration of AWS environments.
Complex AWS environment tend to have users or roles with more privileges granted than they really need. Finding those users and roles can be a time-consuming activity, so tool-support is needed for this task. CloudTracker is an Open-Source-tool for analyzing users, roles and their granted and used privileges.
Running an AWS application in a multi-user environment can be a complex administrative task when a number of regulatory aspects like security and compliance must be followed. AWS Control Tower is an AWS service which assists you during the setup and administration of these environments.
CloudMapper is an open-source tool with features to generate maps and reports. It helps us to analyze complex AWS environments of our clients.
As many other conferences worldwide, AWS re:Invent will take place as a free, 3-week virtual conference this year from Nov. 30 until December 18. Attendees have the choice between keynotes, sessions and trainings in three different time zones.
The European Court of Justice terminated the EU-US Privacy Shield, which was a framework for regulating the transatlantic exchange of personal data. What does that mean for AWS customers in Europe?
Alice&Bob is partnering with Aqua Security to deliver next-level Kubernetes security.
Gartner’s new cloud management wheel shows that security is significant and fundamental, but presents it as a single, non-integrated area.
We strongly believe, in modern and agile operated cloud infrastructures, security should be inherent part of the platform, deeply integrated.
Within the last years, the Security Champions Program initiated by OWASP became more and more popular. Most tech companies are dealing with increasing complexity and challenges as the technology stack grows and diversifies. Security processes and guidelines should not slow down Time-to-market gains.