Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

aws.amazon.com

AWS Security Blog

Get the latest updates from AWS Security Blog directly as they happen.

Follow now 1069 followers

Latest posts

Last updated about 21 hours ago

Secure root user access for member accounts in AWS Organizations

about 21 hours ago

AWS Identity and Access Management (IAM) now supports centralized management of root...

Securing the RAG ingestion pipeline: Filtering mechanisms

4 days ago

Retrieval-Augmented Generative (RAG) applications enhance the responses retrieved from large language models...

Important changes to CloudTrail events for AWS IAM Identity Center

4 days ago

AWS IAM Identity Center is streamlining its AWS CloudTrail events by including...

Threat modeling your generative AI workload to evaluate security risk

5 days ago

As generative AI models become increasingly integrated into business applications, it’s crucial...

Secure by Design: AWS enhances centralized security controls as MFA requirements expand

8 days ago

At Amazon Web Services (AWS), we’ve built our services with secure by...

Updated whitepaper: Architecting for PCI DSS Segmentation and Scoping on AWS

8 days ago

Our mission at AWS Security Assurance Services is to assist with Payment...

Discover duplicate AWS Config rules for streamlined compliance

11 days ago

Amazon Web Services (AWS) customers use various AWS services to migrate, build...

Maximize your cloud security experience at AWS re:Invent 2024: A comprehensive guide to security sessions

12 days ago

AWS re:Invent 2024, which takes place December 2–6 in Las Vegas, will...

Amazon Inspector suppression rules best practices for AWS Organizations

18 days ago

Vulnerability management is a vital part of network, application, and infrastructure security...

Implement effective data authorization mechanisms to secure your data used in generative AI applications

18 days ago

Data security and data authorization, as distinct from user authorization, is a...

Unauthorized tactic spotlight: Initial access through a third-party identity provider

19 days ago

Security is a shared responsibility between Amazon Web Services (AWS) and you...

New AWS Secure Builder training available through SANS Institute

22 days ago

Education is critical to effective security. As organizations migrate, modernize, and build...