Amazon is rolling out automation tools to make it easier to secure applications running on Amazon Web Services. These include automated management of secrets, certificates, firewall policies and compliance data.
The tools, unveiled at AWS Summit in San Francisco on April 4, reflect a philosophy that developers should build security into applications from the beginning, and not bolt protection on after the application is done. Security-as-an-afterthought leads to vulnerabilities, Amazon CTO Werner Vogels said in a keynote at the conference.
Boost your knowledge of cloud-native software and innovations driving data center transformations! Join us in Austin at the fifth-annual Big Communications Event May 14-16. The event is free for communications service providers -- secure your seat today!
AWS Secrets Manager is designed to automate creating, storing and managing secret, such as database credentials, passwords and keys. AWS Certificate Manager, Private Certificate Authority allows developers to provision and manage certificates that are only available to users inside an organization. AWS Firewall Manager centralizes control across multiple AWS accounts and regions. And AWS updated its AWS Config service to aggregate compliance data across accounts and regions.
5G technology holds a good deal of promise for businesses, from expanded IoT capabilities to new ways to reach customers. The downside is that these networks require a new security approach, which InfoSec teams need to start thinking about now.
Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.
With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.
In an era when enterprises are scrambling to keep up with security demands, a new industry survey from ISF finds that having more diverse skills on the InfoSec team is one way to ensure a more stable workforce.
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.