AWS Public Sector Blog

Tag: Amazon GuardDuty

Self-Service Security Assessment with ransomware analysis modules

Assess your security posture to identify and remediate security gaps susceptible to ransomware

As government agencies and public sector organizations modernize their IT and migrate to the AWS Cloud, the ability to gain a full, clear view of the security of their environments is a primary challenge they experience. This lack of visibility leads to blind spots and gaps in their security posture, leaving opportunity for security issues to arise. As a result, AWS developed a new open source Self-Service Security Assessment (with ransomware analysis modules) tool that provides customers with a point-in-time assessment to quickly gain valuable insights into the security posture of their AWS account.

Photo by Michael Daniels on Unsplash

Three ways Health and Human Services agencies benefit from the cloud

Health and human services (HHS) agencies are in the midst of dramatic change, with ever-growing transaction volumes and increasing demand for new services and visibility into data. Looking for new ways to manage constituent demands, the agencies are turning to the cloud to run mission-critical applications that administer healthcare and social benefits programs for millions of beneficiaries, resulting improved system agility, security, and costs.

kids playing on a computer

Gamifying math education: How Prodigy uses AWS to scale and process 20 million questions daily

Prodigy Game (Prodigy) has a mission to help every child in the world love learning and make education freely available to students globally. Prodigy’s math game – geared toward learners in the first to eighth grade – allows students to hone their math skills with questions delivered according to their individual needs. As their user base grew, so did the strain on their ability to handle the increasing demands. They turned to AWS.

The Five Ways Organizations Initially Get Compromised and Tools to Protect Yourself

Over the years, many organizations’ on-premises IT infrastructure has been compromised. Often times, organizations are left defending infrastructure, data, and people without understanding who is attacking them and why. But the sliver lining is that attackers often use the same tactics to try to initially compromise their targets. Knowing the ways that attackers try to get a foothold in your environment can help you defend it better.