
Security Chaos Engineering VS. traditional security approaches 3/4
After introducing Security Chaos Engineering (SCE) as a potential approach to cloud security, we look at important differences between SCE and traditional security approaches. We
After introducing Security Chaos Engineering (SCE) as a potential approach to cloud security, we look at important differences between SCE and traditional security approaches. We
The first post discussed why traditional security concepts are insufficient for the cloud era. This post introduces Security Chaos Engineering (SCE) as an alternative approach
Distributed systems – especially cloud infrastructure – have become increasingly popular in recent years. However, cloud infrastructures have unique characteristics and therefore specific security demands.
We are super happy to be Gold Sponsor at this years AWS Summit in Berlin from 11th to 12th May 2022. The Summit brings the
Service Control Policies allow administrators central control over the maximum permissions of all accounts within their organization. We define, name strategies and look at the
Penetration Tests should be an important part of your company’s security strategy. Security experts – often external – try to find gaps in your IT
What happens to security with rise of quantum computers? How does AWS anticipate this revolution? In this article we’ll have a glimpse in to the
Welche Auswirkungen hat ein Quantencomputer auf die IT-Sicherheit? Wie antizipiert AWS diese Revolution? In diesem Artikel werfen wir einen Blick in die Zukunft und zeigen,
Update 15th Dec 2021: As the current situation is evolving security researchers noted that the presented quick fixes to mitigate the current log4j security vulnerability
Aqua Security offers a SaaS-platform for a number of security-related products for cloud environments. Together with the AWS-build-in-security-tools Aqua enables users to counter the numerous security risks associated with the configuration of AWS environments.