Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder


AWS Security Blog

Get the latest updates from AWS Security Blog directly as they happen.

Follow now 473 followers

Latest posts

Last updated 3 days ago

AWS achieves GSMA security certification for US East (Ohio) Region

3 days ago

We continue to expand the scope of our assurance programs at Amazon...

How to automate incident response to security events with AWS Systems Manager Incident Manager

10 days ago

Incident response is a core security capability for organizations to develop, and...

New Standard Contractual Clauses now part of the AWS GDPR Data Processing Addendum for customers

11 days ago

Today, we’re happy to announce an update to our online AWS GDPR...

Disaster recovery compliance in the cloud, part 2: A structured approach

13 days ago

Compliance in the cloud is fraught with myths and misconceptions. This is...

Disaster recovery compliance in the cloud, part 1: Common misconceptions

13 days ago

Compliance in the cloud can seem challenging, especially for organizations in heavily...

Protect your remote workforce by using a managed DNS firewall and network firewall

14 days ago

More of our customers are adopting flexible work-from-home and remote work strategies...

How US federal agencies can use AWS to encrypt data at rest and in transit

17 days ago

This post is part of a series about how Amazon Web Services...

17 additional AWS services authorized for DoD workloads in the AWS GovCloud Regions

19 days ago

I’m pleased to announce that the Defense Information Systems Agency (DISA) has...

How US federal agencies can authenticate to AWS with multi-factor authentication

25 days ago

This post is part of a series about how AWS can help...

Top 10 security best practices for securing data in Amazon S3

25 days ago

With more than 100 trillion objects in Amazon Simple Storage Service (Amazon...

How to improve visibility into AWS WAF with anomaly detection

26 days ago

When your APIs are exposed on the internet, they naturally face unpredictable...

Ransomware mitigation: Top 5 protections and recovery preparation actions

26 days ago

In this post, I’ll cover the top five things that Amazon Web...