Securing the Cloud: Leveraging AWS Identity, Access Management, and Security Tools

Securing the Cloud: Leveraging AWS Identity, Access Management, and Security Tools

Secure Cloud Systems: AWS's Enhanced Security FeaturesПодробнее

Secure Cloud Systems: AWS's Enhanced Security Features

Securing AWS Discover Cloud Vulnerabilities via Pentesting Techniques | Beau BullockПодробнее

Securing AWS Discover Cloud Vulnerabilities via Pentesting Techniques | Beau Bullock

HashiCorp Vault and Jenkins - Leveraging AWS IAM to Empower a Hybrid ScenarioПодробнее

HashiCorp Vault and Jenkins - Leveraging AWS IAM to Empower a Hybrid Scenario

AWS Supports You - Identifying and Mitigating Aged IAM Access KeysПодробнее

AWS Supports You - Identifying and Mitigating Aged IAM Access Keys

Identity-In-Depth: Leveraging Native Tools and a Multi-Layered Approach to Secure Cloud IdentityПодробнее

Identity-In-Depth: Leveraging Native Tools and a Multi-Layered Approach to Secure Cloud Identity

How to Improve Threat Detection and Hunting in the AWS Cloud Using the MITRE ATT&CK MatrixПодробнее

How to Improve Threat Detection and Hunting in the AWS Cloud Using the MITRE ATT&CK Matrix

How to Leverage a CASBПодробнее

How to Leverage a CASB

How to prioritize security controls for sensitive AWS assetsПодробнее

How to prioritize security controls for sensitive AWS assets

AWS re:Inforce 2019: How FINRA Achieves DevOps Agility While Securing Its AWS Environments (GRC339)Подробнее

AWS re:Inforce 2019: How FINRA Achieves DevOps Agility While Securing Its AWS Environments (GRC339)

Secure and Streamline Access to Your AWS Management Console with OktaПодробнее

Secure and Streamline Access to Your AWS Management Console with Okta

AWS re:Invent 2015 | (SEC313) Security and Compliance at the Petabyte ScaleПодробнее

AWS re:Invent 2015 | (SEC313) Security and Compliance at the Petabyte Scale

AWS re:Invent 2014 | (MED303) Secure Media Streaming and DeliveryПодробнее

AWS re:Invent 2014 | (MED303) Secure Media Streaming and Delivery

Новости