Jonathan from Thales explains how his company built an automated threat detection and remediation solution using AWS Security Services and serverless technology. Learn how Thales collects security events in real time, processes them, and notifies the team through its Instant Messenger and ITSM tool.
In this tech talk, you will learn how you can use Security Hub to run automated, continuous security checks...
Most Recent Articles
Learn how organizations of all sizes use AWS to increase agility, lower costs, and accelerate innovation in the cloud.
Browse the page to learn about our latest innovations in Security, Identity, & Compliance.
Digital Partners, a Munich Re company, is a pioneer in supporting InsurTechs in Europe and North America by providing insurance expertise, back-office operations, and more.
Panasonic Avionics needed a solution that could help it execute the transformation and keep the new cloud data infrastructure secure and compliant.
AWS WAF Bot Control gives you visibility and control over common and pervasive bot traffic that can consume excess resources, skew metrics, cause downtime, or perform other undesired activities.
AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits and bots.
This session walks you through how to get started with AWS Network Firewall, common use cases, architecture patterns, and rules creation.
Cloud Audit Academy (CAA) is an Amazon Web Services (AWS) Security Auditing Learning Path designed for those that are in auditing, risk, and compliance roles.
AWS Backup Audit Manager is a new feature of AWS Backup that helps you monitor and evaluate the compliance status of your backups to meet business and regulatory requirements.
AWS Artifact is your go-to, central resource for compliance-related information that matters to you.
Earning customer trust is the foundation of our business at AWS and we know you trust us to protect your most critical and sensitive assets: your data.
AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources.
Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS.
AWS Key Management Service (KMS) makes it easy for you to create and manage cryptographic keys and control their use across a wide range of AWS services and in your applications.
AWS IAM Access Analyzer helps you identify the resources in your organization and accounts, such as Amazon S3 buckets or IAM roles, shared with an external entity.
In this tech talk, we'll answer questions, such as “How do I automate responses to threat findings? How do I set up master-member across regional account?"
CloudEndure Disaster Recovery minimizes downtime and data loss by providing fast, reliable recovery of physical, virtual, and cloud-based servers into AWS Cloud.
Amazon Detective makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities.
Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon S3.
AWS Security Hub is a cloud security posture management service that performs security best practice checks, aggregates alerts, and enables automated remediation.