searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

AWS

Get our top stories in your inbox

Python packages with malicious code expose secret AWS credentials

June 27, 2022

Sonatype researchers have discovered Python packages that contain malicious code that peek into and expose secret AWS credentials, network interface information, and …

Druva partners with AWS to deliver cloud-first data protection across multiple applications

May 11, 2022

Druva announced a multi-year global Strategic Collaboration Agreement (SCA) with Amazon Web Services (AWS) to accelerate customer migration and provide an added layer of cyber …

Amazon Aurora Serverless v2 removes the complexity of managing database capacity

April 23, 2022

Amazon Web Services released Amazon Aurora Serverless v2, the next generation of Amazon Aurora Serverless that automatically scales to hundreds of thousands of transactions in …

Data Theorem offers security notifications within AWS Security Hub to prevent data breaches

April 2, 2022

Data Theorem announced it is running on Amazon Web Services (AWS) Security Hub to provide better security alert consolidation from its cloud-native application protection …

Palo Alto Networks launches firewall service for AWS to protect enterprises from cyberattacks

April 1, 2022

Palo Alto Networks announced that it has teamed up with Amazon Web Services (AWS) to unveil the new Palo Alto Networks Cloud NGFW for AWS — a managed Next-Generation Firewall …

Ermetic launches open source tool that analyzes AWS CloudTrail AccessDenied events

March 25, 2022

Ermetic released a free open source tool for managing AccessDenied Events in Amazon Web Services (AWS) that automates time consuming cloud access policy troubleshooting and …

ExtraHop Reveal(x) 360 for AWS detects malicious activity across workloads

March 24, 2022

ExtraHop announced that it has extended the power of Reveal(x) 360 to provide frictionless threat visibility for Amazon Web Services (AWS). ExtraHop Reveal(x) 360 now applies …

Cascadeo partners with AWS to accelerate enterprise and mid-market cloud adoption

March 2, 2022

Cascadeo announced a strategic collaboration with Amazon Web Services (AWS) to accelerate enterprise and mid-market cloud adoption. This announcement represents a significant …

How to empower IT Sec and Ops teams to anticipate and resolve IT problems

March 1, 2022

Every IT system administrator knows the misery of facing a problem for which the root cause requires hours (and sometimes days) to unearth, all the while part of the IT …

Redstor launches a service for IT service providers to protect Kubernetes environments in AWS

February 24, 2022

Redstor launched a new service aimed at transforming how managed and cloud service providers (MSPs and CSPs) protect Kubernetes environments in AWS. By adding support for …

Benu Networks collaborates with AWS to bring cloud-native networks for service providers

February 24, 2022

Benu Networks announced it is working with AWS to allow communication service providers (CSPs) to deploy Benu Networks’ cloud-native Broadband Network Gateway (BNG) and Secure …

Confluent partners with AWS to accelerate cloud adoption with real-time data for organizations

January 29, 2022

Confluent announced a strategic collaboration agreement (SCA) with Amazon Web Services (AWS) to help organizations accelerate their cloud adoption journey with real-time data. …

Posts navigation

1 2 3 4 5 … 14

Featured news

  • How parents can talk about online safety and personal info protection with their kids
  • Why digital trust needs to be a strategic imperative for your company
  • Exploring the insecurity of readily available Wi-Fi networks
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

Photos: Cyber Week 2022

How parents can talk about online safety and personal info protection with their kids

Destructive firmware attacks pose a significant threat to businesses

Why digital trust needs to be a strategic imperative for your company

Don't miss

Photos: Cyber Week 2022

How parents can talk about online safety and personal info protection with their kids

Destructive firmware attacks pose a significant threat to businesses

Why digital trust needs to be a strategic imperative for your company

Researchers uncover ZuoRAT malware targeting home-office routers

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise