AWS Compute Optimizer now supports idle resource recommendation
Today, AWS announces that AWS Compute Optimizer now supports recommendations to help you identify idle AWS resources. With...
Bigger and badder: how DDoS attack sizes have evolved over the last decade
Distributed Denial of Service (DDoS) attacks are cyberattacks that aim to overwhelm and disrupt online services, making them...
Amazon QuickSight supports fine grained permissions for capabilities with APIs for IAM Identity Center users
Amazon QuickSight now supports user level custom permissions profile assignment for IAM Identity Center users. Custom permissions profiles...
Amazon Kinesis Data Streams On-Demand mode supports streams writing up to 10GB/s
Amazon Kinesis Data Streams On-Demand Mode now automatically scales to support streaming applications that write up to 10GB/s...
Advancing Neuroscience Research with Visual Question Answering and Multimodal Retrieval
Leading healthcare organizations are turning to generative AI to help build applications that can deliver life-saving impacts. These...
Amazon Application Recovery Controller zonal shift and zonal autoshift now support Amazon EKS in the GovCloud (US) Regions
Amazon Application Recovery Controller (ARC) zonal shift and zonal autoshift have expanded their capabilities and now support Amazon...
AWS Control Tower improves Hooks management for proactive controls and extends proactive controls support in additional regions
Today, we are excited to release an improved AWS CloudFormation Hooks management capability for AWS Control Tower proactive...
Amazon WorkSpaces Secure Browser now supports inline data redaction
Today, AWS End User Computing Services announced customers may now redact specified data fields in web content accessed...
Top 5 fastest-growing cities for data centers
The five fastest-growing hubs for data center expansion include an interesting mix of urban areas that have one...
Fintech giant Finastra investigates data breach after SFTP hack
Finastra has confirmed it warned customers of a cybersecurity incident after a threat actor began selling allegedly stolen...
MITRE shares 2024’s top 25 most dangerous software weaknesses
MITRE has shared this year’s top 25 list of the most common and dangerous software weaknesses behind more...
US charges five linked to Scattered Spider cybercrime gang
The U.S. Justice Department has charged five suspects believed to be part of the financially motivated Scattered Spider...
Ubuntu Linux impacted by decade-old ‘needrestart’ flaw that gives root
Five local privilege escalation (LPE) vulnerabilities have been discovered in the needrestart utility used by Ubuntu Linux, which...
Cisco: Pressure to deploy AI is up, but only 13% feel ready
Pressure to implement AI plans is on the rise, but the readiness of enterprise networks to handle AI...
Amazon RDS Blue/Green Deployments support storage volume shrink
Amazon Relational Database Service (Amazon RDS) Blue/Green Deployments now supports the ability to shrink the storage volumes for...
Amazon CloudWatch Application Signals launches support for Runtime Metrics
Today, AWS announces the general availability of runtime metrics support in Amazon CloudWatch Application Signals, an OpenTelemetry (OTel)...
Amazon Connect Contact Lens launches custom dashboards
Amazon Connect Contact Lens now supports creating custom dashboards, as well as adding or removing widgets from existing...
Amazon ECS announces AZ rebalancing that speeds up mean time to recovery after an infrastructure event
Amazon Web Services (AWS) has announced the launch of Availability Zone (AZ) rebalancing for Amazon Elastic Container Service...
Amazon EKS managed node groups now support AWS Local Zones
Amazon Elastic Kubernetes Service (Amazon EKS) now supports using managed node groups for Kubernetes workloads running on AWS...
Amazon OpenSearch Serverless Includes SQL API Support
Amazon OpenSearch Serverless now enables you to query your data using OpenSearch SQL and OpenSearch Piped Processing Language...