Automate Amazon EC2 instance isolation by using tags

By Dustin Ward

AWS FeedAutomate Amazon EC2 instance isolation by using tags Containment is a crucial part of an overall Incident Response Strategy, as this practice allows time for responders to perform forensics, eradication and recovery during an Incident. There are many different approaches to containment. In this post, we will be focusing on isolation—the ability to keep…

AWS AppConfig is now available in AWS GovCloud (US) Regions

By Dustin Ward

AWS FeedAWS AppConfig is now available in AWS GovCloud (US) Regions AWS AppConfig is now available in the AWS GovCloud (US) Regions. AWS AppConfig helps you deploy application configurations in a managed and monitored way just like you do with code deployments, but without the need to change the code if a configuration value changes.…

SafetyVisor: Protecting Against COVID-19 with Computer Vision and AWS

By Dustin Ward

AWS FeedSafetyVisor: Protecting Against COVID-19 with Computer Vision and AWS By Nicholas Burden, Senior Technical Evangelist at TensorIoT As COVID-19 has swept across the globe, it has radically challenged businesses in every industry. TensorIoT has responded to these events by innovating to provide companies with powerful tools to drive success under extreme circumstances. To help…

AWS Config now supports Amazon container services

By Dustin Ward

AWS FeedAWS Config now supports Amazon container services AWS Config now supports Amazon Elastic Container Service (Amazon ECS), Amazon Elastic Container Registry (Amazon ECR), and Amazon Elastic Kubernetes Service (Amazon EKS) in all AWS Regions. With this launch, you can now use AWS Config to monitor configuration data for container-based resources in your AWS account,…

How to protect sensitive data for its entire lifecycle in AWS

By Dustin Ward

AWS FeedHow to protect sensitive data for its entire lifecycle in AWS Many Amazon Web Services (AWS) customer workflows require ingesting sensitive and regulated data such as Payments Card Industry (PCI) data, personally identifiable information (PII), and protected health information (PHI). In this post, I’ll show you a method designed to protect sensitive data for…