AWS Public Sector Blog
Tag: Amazon Inspector
AWS announces low-to-no cost security services for federal political campaigns and committees
It is essential for election campaigns and committees to have access to the latest security services so they can mitigate risks against security threats at minimal cost. To support this, AWS is collaborating with Defending Digital Campaigns (DDC) to offer more than 20 cybersecurity-related AWS services for low-to-no cost to all active and registered national party committees and federal candidate committees for the US House and US Senate midterm elections that are eligible in accordance with DDC and Federal Election Commission (FEC) criteria.
AWS resources to address Apache Log4j vulnerabilities
This post aims to provide a summary of all the currently disclosed Apache Log4j issues as well as important resources that Amazon Web Services (AWS) has released to help our customers and partners limit any risks posed by these issues.
Using digital games to teach civics
iCivics is the education nonprofit that US Supreme Court Justice Sandra Day O’Connor founded in 2009 to transform civic education and rebuild civic strength through digital games and lesson plans. It is the country’s largest provider of civic education content and is currently used by more than 120,500 educators and 7.6 million students annually. All of its games are free, nonpartisan, and available at www.icivics.org. Through their use of Amazon Aurora, Amazon ElastiCache, Amazon CloudFront, and AWS CodeDeploy—and AWS security automation tools including AWS Security Hub, Amazon Inspector, and Amazon GuardDuty—iCivics has been able to scale and increase student engagement.
Modern data engineering in higher ed: Doing DataOps atop a data lake on AWS
Modern data engineering covers several key components of building a modern data lake. Most databases and data warehouses, to an extent, do not lend themselves well to a DevOps model. DataOps grew out of frustrations trying to build a scalable, reusable data pipeline in an automated fashion. DataOps was founded on applying DevOps principles on top of data lakes to help build automated solutions in a more agile manner. With DataOps, users apply principles of data processing on the data lake to curate and collect the transformed data for downstream processing. One reason that DevOps was hard on databases was because testing was hard to automate on such systems. At California State University Chancellors Office (CSUCO), we took a different approach by residing most of our logic with a programming framework that allows us to build a testable platform. Learn how to apply DataOps in ten steps.
The Five Ways Organizations Initially Get Compromised and Tools to Protect Yourself
Over the years, many organizations’ on-premises IT infrastructure has been compromised. Often times, organizations are left defending infrastructure, data, and people without understanding who is attacking them and why. But the sliver lining is that attackers often use the same tactics to try to initially compromise their targets. Knowing the ways that attackers try to get a foothold in your environment can help you defend it better.