Threats and key takeaways for the legal sector
New NCSC report outlines the growing threat to the legal sector, with recommendations to improve cyber resilience. Source::...
Cyber Threat Report: UK Legal Sector
An updated report from the NCSC explaining how UK law firms – of all sizes – can protect...
Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager;...
Cisco Duo Two-Factor Authentication for macOS Authentication Bypass Vulnerability
A vulnerability in Cisco Duo Two-Factor Authentication for macOS could allow an authenticated, physical attacker to bypass secondary...
Tagging support for AWS Purchase Order Management
Today, AWS Purchase Order Management announces the general availability of ‘Attribute-based & Resource-based access control’ for purchase orders...
AWS Elemental MediaConvert releases bandwidth reduction filter for HEVC and AVC
Today, AWS announces the general availability of bandwidth reduction filtering for the AVC and HEVC encoders in AWS...
AWS Lambda supports starting from timestamp for Kafka event sources
AWS Lambda now supports starting from a specific timestamp when using Amazon Managed Streaming for Apache Kafka (MSK)...
Webinar: Unleash the Power of Vision Transformers
Learn how Vision Transformers are revolutionizing AI applications with image understanding and analysis. Learn how Vision Transformers are...
Amazon EC2 M6gd instances are now available in Europe (Paris) region
Starting today, Amazon Elastic Compute Cloud (Amazon EC2) M6gd instances are available in Europe (Paris) region. These instances...
Amazon accused of tricking Prime customers
The US has sued Amazon for allegedly manipulating customers during the Prime sign-up process. Source:: BBC News –...
Amazon Redshift improves the experience for encrypting the data warehouse
Amazon Redshift offers comprehensive encryption capabilities to protect your data at rest. Now, Amazon Redshift further enhances the...
New EU security strategy aims to safeguard tech supply chains
A draft strategy published this week by the EU would impose export controls on critical technology and protect...
Transform data into ML features using SageMaker Feature Store feature processing
Amazon SageMaker Feature Store now supports feature processing, a new capability that enables you to transform data into...
Why Malware Crypting Services Deserve More Scrutiny
If you operate a cybercrime business that relies on disseminating malicious software, you probably also spend a good...
AWS Application Discovery Service introduces Amazon EC2 recommendations
Today, AWS Application Discovery Service introduces a public API to estimate the cost of running your existing on-premises...
Amazon EMR now publishes events for insufficient instance capacity errors
Today, we are excited to announce that Amazon EMR now publishes events for insufficient instance capacity. This launch...
Announcing service-scoped free tier pricing rules for AWS Billing Conductor
Starting today, customers can create proforma pricing rules to control the application of free tier offers for specific...
Amazon Personalize now supports filtering selected items by properties of the input item
Amazon Personalize announces the ability to filter (include or exclude) recommendations for Related Items recipes based on the...
AWS Transfer Family announces Drummond Group Applicability Statement 2 (AS2) Certification
AWS Transfer Family has earned the official Drummond Group AS2 Cloud Certification Seal. Drummond Group is an independent...
Amazon EC2 T4g instances are now available in additional regions
Starting today, Amazon Compute Cloud (Amazon EC2) T4g instances are available in Asia Pacific (Jakarta, Melbourne, Osaka), Europe...