Uncategorized

Amazon CloudFront simplifies web application delivery and security with new user-friendly interface

Today, we’re announcing a new simplified onboarding experience for Amazon CloudFront that developers can use to accelerate and secure their web applications in seconds. This new experience, along with improvements to the AWS WAF console experience, makes it easier than ever for developers to configure content delivery and security services without requiring deep technical expertise. …

Amazon CloudFront simplifies web application delivery and security with new user-friendly interface Read More »

New AWS Shield feature discovers network security issues before they can be exploited (Preview)

Today, I’m happy to announce AWS Shield network security director (preview), a capability that simplifies identification of configuration issues related to threats such as SQL injections and distributed denial of service (DDoS) events, and proposes remediations. This feature identifies and analyzes network resources, connections, and configurations. It compares them against AWS best practices to create …

New AWS Shield feature discovers network security issues before they can be exploited (Preview) Read More »

Verify internal access to critical AWS resources with new IAM Access Analyzer capabilities

Today, we’re announcing a new capability in AWS IAM Access Analyzer that helps security teams verify which AWS Identity and Access Management (IAM) roles and users have access to their critical AWS resources. This new feature provides comprehensive visibility into access granted from within your Amazon Web Services (AWS) organization, complementing the existing external access …

Verify internal access to critical AWS resources with new IAM Access Analyzer capabilities Read More »

AWS Certificate Manager introduces exportable public SSL/TLS certificates to use anywhere

Today, we’re announcing exportable public SSL/TLS certificates from AWS Certificate Manager (ACM). Prior to this launch, you can issue your public certificates or import certificates issued by third-party certificate authorities (CAs) at no additional cost, and deploy them with integrated AWS services such as Elastic Load Balancing (ELB), Amazon CloudFront distribution, and Amazon API Gateway. …

AWS Certificate Manager introduces exportable public SSL/TLS certificates to use anywhere Read More »

AWS Weekly Roundup: AWS re:Inforce 2025, AWS WAF, AWS Control Tower, and more (June 16, 2025)

Today marks the start of AWS re:Inforce 2025, where security professionals are gathering for three days of technical learning sessions, workshops, and demonstrations. This security-focused conference brings together AWS security specialists who build and maintain the services that organizations rely on for their cloud security needs. AWS Chief Information Security Officer (CISO) Amy Herzog will …

AWS Weekly Roundup: AWS re:Inforce 2025, AWS WAF, AWS Control Tower, and more (June 16, 2025) Read More »

SaaS Backup Solutions: Protect Microsoft 365, Entra ID, and Salesforce

The Need for SaaS Backup As organizations increasingly adopt and rely on Software as a Service (SaaS) for business-critical functions, it’s essential that IT operations and security professionals scrutinize the availability and integrity of the data within these posted applications. Solutions like Microsoft 365, Entra ID, and Salesforce keep your data secure, and provide recycle …

SaaS Backup Solutions: Protect Microsoft 365, Entra ID, and Salesforce Read More »

Encryption in Real Time: What Really Happens During a Ransomware Attack

It starts like any other morning — except for the IT admin, who logs in first. You check the monitoring dashboard and see a few alerts: elevated CPU usage, a couple of failed logins, then a string of disconnected endpoints. At first, it looks like routine noise. Maybe a patch failed overnight. Maybe a script …

Encryption in Real Time: What Really Happens During a Ransomware Attack Read More »

Building Data Resilience: Lessons from Cricket, Business, and the Seattle Orcas

Relentless grit and fiery determination aren’t just hallmarks of Seattle Orcas cricket, they’re the foundation of resilience that every organization needs.  At Veeam, resilience drives everything we do. From protecting our customers’ data to partnering with champions of adaptability like the Seattle Orcas, resilience shapes our approach. Our multi-year commitment goes beyond sponsorship. Instead, it’s …

Building Data Resilience: Lessons from Cricket, Business, and the Seattle Orcas Read More »

Coveware by Veeam Incident Response Retainer

Purpose-Built Expertise for Ransomware and Cyber Extortion Ransomware and cyber extortion are more than security incidents; they are full-scale business crises. When operations halt and leadership demands answers, you need more than generalist DFIR. You need a partner fluent in high-stakes ransomware extortion. Coveware by Veeam offers a dedicated Incident Response Retainer focused exclusively on …

Coveware by Veeam Incident Response Retainer Read More »

AWS Weekly Roundup: New AWS Heroes, Amazon Q Developer, EC2 GPU price reduction, and more (June 9, 2025)

The AWS Heroes program recognizes a vibrant, worldwide group of AWS experts whose enthusiasm for knowledge-sharing has a real impact within the community. Heroes go above and beyond to share knowledge in a variety of ways in developer community. We introduce our newest AWS Heroes in the second quarter of 2025. To find and connect …

AWS Weekly Roundup: New AWS Heroes, Amazon Q Developer, EC2 GPU price reduction, and more (June 9, 2025) Read More »

Scroll to Top