CYBER WEEK DEAL 50% off all yearly plans 🔥 See what we offer →

Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

aws.amazon.com

AWS Security Blog

Get the latest updates from AWS Security Blog directly as they happen.

Follow now 1076 followers

Latest posts

Last updated about 2 hours ago

Preparing for take-off: Regulatory perspectives on generative AI adoption within Australian financial services

about 2 hours ago

The Australian financial services regulator, the Australian Prudential Regulation Authority (APRA), has...

Exploring the benefits of artificial intelligence while maintaining digital sovereignty

4 days ago

Around the world, organizations are evaluating and embracing artificial intelligence (AI) and...

Secure root user access for member accounts in AWS Organizations

11 days ago

AWS Identity and Access Management (IAM) now supports centralized management of root...

Securing the RAG ingestion pipeline: Filtering mechanisms

14 days ago

Retrieval-Augmented Generative (RAG) applications enhance the responses retrieved from large language models...

Important changes to CloudTrail events for AWS IAM Identity Center

14 days ago

AWS IAM Identity Center is streamlining its AWS CloudTrail events by including...

Threat modeling your generative AI workload to evaluate security risk

15 days ago

As generative AI models become increasingly integrated into business applications, it’s crucial...

Secure by Design: AWS enhances centralized security controls as MFA requirements expand

18 days ago

At Amazon Web Services (AWS), we’ve built our services with secure by...

Updated whitepaper: Architecting for PCI DSS Segmentation and Scoping on AWS

18 days ago

Our mission at AWS Security Assurance Services is to assist with Payment...

Discover duplicate AWS Config rules for streamlined compliance

21 days ago

Amazon Web Services (AWS) customers use various AWS services to migrate, build...

Maximize your cloud security experience at AWS re:Invent 2024: A comprehensive guide to security sessions

22 days ago

AWS re:Invent 2024, which takes place December 2–6 in Las Vegas, will...

Amazon Inspector suppression rules best practices for AWS Organizations

28 days ago

Vulnerability management is a vital part of network, application, and infrastructure security...

Implement effective data authorization mechanisms to secure your data used in generative AI applications

28 days ago

Data security and data authorization, as distinct from user authorization, is a...