Trending

#awssecurity

Latest posts tagged with #awssecurity on Bluesky

Latest Top
Trending

Posts tagged #awssecurity

Post image

Cybersicherheit und KI-Governance direkt im Browser

#AWS #AWSSecurity #Cybersecurity #Cybersicherheit #EnterpriseBrowser #Identität @Island.io #künstlicheIntelligenz #SecurityOperations

netzpalaver.de/2026/...

0 0 0 0
Now on Crucial Exams: AWS Certified Security Specialty (SCS-C03) - 250 practice questions and 220 flashcards to help you pass. Start studying: https://crucialexams.com/s/hjqNttCN #AWSSecurity

Now on Crucial Exams: AWS Certified Security Specialty (SCS-C03) - 250 practice questions and 220 flashcards to help you pass. Start studying: https://crucialexams.com/s/hjqNttCN #AWSSecurity

Now on Crucial Exams: AWS Certified Security Specialty (SCS-C03) - 250 practice questions and 220 flashcards to help you pass. Start studying: buff.ly/G8enIKV #AWSSecurity

0 0 0 0
Preview
Close the S3 Breach Vector » CloudSee Drive Learn how to resolve the s3 breach legacy vector problem in Amazon S3 buckets, identify risky public access, and phase in IAM & ACL updates.

If “S3 breach” feels like a repeating headline, it’s because the pattern hasn’t changed: legacy buckets, misconfig, and zero dependency visibility.

Treat S3 like a controlled change, not a guessing game: ​
www.cloudseedrive.com/s3-breach-ve...

#S3Breach #AWSSecurity #AmazonS3 #CloudSeeDrive

0 0 0 0

How to Secure Your AWS Environment Best Practices and Tools
www.ekasclown.com/our-blog/how...
#AWS #AWSSecurity #ClownSecurity #PotatoSecurity #AWSBestPractices #ClownComputing #SecurityTools #IAM #ZeroTrust #DataProtection #DevSecOps #SecurityCompliance #AWSClown #InfoSec #Clown

0 0 0 0
Preview
How to Secure Your AWS Environment Best Practices and Tools As cloud adoption continues to grow, securing cloud infrastructure has become a critical priority for organizations of all sizes. Amazon Web Services (AWS), the market leader in cloud computing, of...

How to Secure Your AWS Environment Best Practices and Tools
www.ekascloud.com/our-blog/how...
#AWS #AWSSecurity #CloudSecurity #CyberSecurity #AWSBestPractices #CloudComputing #SecurityTools #IAM #ZeroTrust #DataProtection #DevSecOps #SecurityCompliance #AWSCloud #InfoSec #Cloud

0 0 0 0
Preview
AWS Weekly Roundup: Claude Opus 4.6 in Amazon Bedrock, AWS Builder ID Sign in with Apple, and more (February 9, 2026) | Amazon Web Services This week's roundup covers launches across compute, networking, security, and AI. Amazon EC2 introduces new C8id, M8id, and R8id instances powered by custom Intel Xeon 6 processors. AWS Network Firewall...

📰🚨 AWS Weekly Roundup: Claude Opus 4.6 in Amazon Bedrock, AWS Builder ID Sign in with Apple, and more (February 9, 2026)

#AWSLaunches #CloudComputing #AWSSecurity #AWSIdentity #AmazonBedrock

0 0 0 0
Preview
Cloud Security in 2026: Designing Systems That Protect Themselves Cloud security is evolving faster than most teams can react. As we kick off 2026, one truth is...

✍️ New blog post by Isaac Oppong-Amoah

Cloud Security in 2026: Designing Systems That Protect Themselves

#cloudsecurity #devsecops #awssecurity #soc

0 0 0 0
Preview
Adding one more thought here. Least privilege is not about locking everything down. It’s about making failure predictable. That shift alone changed how I design IAM policies. IAM Least Privilege: What Everyone Gets...

✍️ New blog post by Augusto Valdivia

Adding one more thought here.

Least privilege is not about locking everything down.
It’s about making failure predictable.

That shift alone changed how I design IAM policies.

#terraform #awssecurity #aws #devops

1 0 0 0
Preview
Amazon links long-running AWS attacks to Russia's GRU and North Korean hackers CJ Moses, Amazon's chief information security officer, confirmed the discovery in a December 15 analysis, describing the campaign as

Amazon links long-running AWS attacks to Russia's GRU and North Korean hackers #Technology #Cybersecurity #AWSsecurity #CyberThreats #Hacking

0 0 0 0
Preview
IAM Least Privilege: What Everyone Gets Wrong (and How to Fix It with Terraform) When we’re under pressure, the fastest solution often wins. Someone needs access, something is...

✍️ New blog post by Augusto Valdivia

IAM Least Privilege: What Everyone Gets Wrong (and How to Fix It with Terraform)

#terraform #awssecurity #aws #devops

0 0 0 0
Preview
AWS Lambda Managed Instances: A Security Overview An initial security overview of AWS Lambda Managed Instances, exploring the Bottlerocket-based architecture, the 'Elevator' components, and security insights for this new compute model.

Behind the curtain - AWS Lambda Managed Instances: A Security Overview #awssecurity #cloudsecurity


www.offensai.com/blog/aws-lam...

0 0 0 0
Preview
Amazon GuardDuty adds Extended Threat Detection for Amazon EC2 and Amazon ECS | Amazon Web Services Today, we’re announcing new enhancements to Amazon GuardDuty Extended Threat Detection with the addition of two attack sequence findings for Amazon Elastic Compute Cloud (Amazon EC2) instances and Amazon...

📰🚨 Amazon GuardDuty adds Extended Threat Detection for Amazon EC2 and Amazon ECS

#AmazonGuardDuty #ExtendedThreatDetection #AWSSecurity #CloudSecurity #ECSAndEC2

ift.tt/Y0adPB3

0 0 0 0
Preview
Amazon GuardDuty adds Extended Threat Detection for Amazon EC2 and Amazon ECS | AWS News Blog Today, we’re announcing new enhancements to Amazon GuardDuty Extended Threat Detection with the addition of two attack sequence findings for Amazon Elastic Compute Cloud (Amazon EC2) instances and Amazon Elastic Container Service (Amazon ECS) tasks. These new findings build on the existing Extended Threat Detection capabilities, which already combine sequences involving AWS Identity and Access […]

Nice

Extended threat detection for EC2 and ECS

aws.amazon.com/blogs/aws/am...

AWS real-time risk prioritization (was preview now GA)

aws.amazon.com/blogs/aws/aw...

AWS Security Agent (for appsec/dev)

aws.amazon.com/blogs/aws/ne...

#awssecurity #aws #AWSreInvent

1 0 0 0

Hacker News debated an AWS account compromise reported after a recent outage. The core question: was it correlation or coincidence? Discussion explored potential attack vectors, attacker timing strategies, and crucial security practices. #AWSsecurity 1/6

0 0 1 0
Post image

Start with the least access possible, add only what’s needed, and enforce MFA. IAM Access Analyzer can even show you which permissions are overkill.
Small changes here can stop big headaches later.
#AWS #IAM #Azure #Cloud #CloudSecurity #DataSecurity #AWSSecurity #AzureSecurity #cybersecurity #MFA

1 0 0 0
Video

Cloud security can be confusing, but there are a few easy things you can do that can make a big impact.

So easy you can watch this short video and begin implementing.

#AWS #Azure #Cloud #CloudSecurity #DataSecurity #AWSSecurity #AzureSecurity #cybersecurity

2 0 0 0
Video

Most small teams don't have a budget for a devops person. So what do you do?

#AWS #Azure #Cloud #CloudSecurity #DataSecurity #AWSSecurity #AzureSecurity #cybersecurity

2 0 0 0
Preview
Understanding Costs and Billing in AWS: A Simple Guide to Saving Money and Managing Your Cloud… Picture this: you’re running a small startup, and you check your AWS bill — bam, it’s way higher than you thought. That’s enough to make…

AWS can be great. When getting started you have access to a lot of free usage. But once your software takes off and you have to pay for what you're using... You should be surprised with a 4 or 5-figure monthly bill. Here's how to keep those costs in check.
#AWS #awssecurity #cloud #cybersecurity

2 0 0 0
Preview
5 AWS Security Mistakes Your Business Is Making — And How To Fix Them for Safer Cloud Operations Let’s be real: nearly every business on AWS has made a security mistake or two. It’s easier than you’d think to leave an S3 bucket open or…

I worked worked with many businesses who aren't doing cloud security right. And if you're not doing it right, it could cost you. Big time.
#AWS #awssecurity #cloud #cloudoperations #businesssecurity #cybersecurity #cybersecurityawareness #cybersecuritytips #cybersecuritytraining #networksecurity

4 0 0 0
Video

🔐 How do we keep AWS workloads secure at Stormit?
From best-practice architectures to continuous monitoring, we protect your apps while you scale.
👉 www.stormit.cloud

#Stormit #AWS #CloudSecurity #CyberSecurity #CloudComputing #AWSSecurity

1 0 0 0
Post image

Hunt for some vulnerabilities on WP 🏴‍☠️🐺

You should share your experience with that.

#cybersecurity #pentest #RedTeam #PurpleTeam
#securityoperations #awssecurity
#threathunting #blueteam #threatdetection #vulnerability #wordpress

0 0 0 0
Preview
AWS Security Digest - Issue 219

Some good reads in the latest AWS security digest

#awssecurity

awssecuritydigest.com/past-issues/...

0 0 0 0

Why is Inspector Code Security not integrated in Security Hub on day 1?

#awssecurity

docs.aws.amazon.com/inspector/la...

0 0 0 0
Post image Post image Post image Post image

Safeguarding your cloud environment is crucial. Discover AWS security best practices for 2025 to protect your data and infrastructure!

#AWSSecurity #CloudSecurity #DataProtection #CyberSecurity2025 #AWSBestPractices

0 0 0 0

There’s a decent amount of talk and research on specific AWS api calls that aren’t logged to cloudtrail but is there an all encompassing list (GitHub hopefully) that covers everything currently known?

#awssecurity

0 0 0 0

Missed AWS re:Inforce 2025? Get caught up fast! This repo offers detailed summaries, key points, and technical insights from over 160 talks, saving you 40+ hours. Dive into AI security, DevSecOps, IAM, and more!
https://link.cedricthibault.cloud/R9I3S6
#AWSSecurity #reInforce2025 #CloudSecurity

0 0 0 0