AWS named as a Leader in 2025 Gartner Magic Quadrant for Strategic Cloud Platform Services for 15 years in a row
Prioritize vulnerabilities based on the CISA Known Exploited Vulnerabilities Catalog
Celebrating 10 years of Amazon Aurora innovation
Beyond guardrails: A taxonomy of platform engineering control mechanisms
Monitor your databases on Compute Engine with Database Center
The human firewall: Building a cyber-aware workforce
Using Security Expertise to Bridge the Communication Gap
Water Systems Under Attack: Norway, Poland Blame Russia Actors
UK Advice to Delete Emails for Water Conservation Draws Backlash
Effectively building AI agents on AWS Serverless
Downgrade Attack Allows Phishing Kits to Bypass FIDO
State and Local Leaders Lobby Congress for Cybersecurity Resources
Google Chrome Enterprise: Advanced Browser Security for the Modern Workforce
Police & Government Email Access for Sale on Dark Web
CISA Warns N-able Bugs Under Attack, Patch Now
Cybersecurity Spending Slows & Security Teams Shrink
Scalable AI starts with storage: Guide to model artifact strategies
Google Invests $9B to Power ‘America’s AI Leadership’ From Oklahoma
Google Chrome Enterprise: Extend Protections From Browser to OS
Cloud CISO Perspectives: New Threat Horizons details evolving risks — and defenses
How Keeta processes 11 million financial transactions per second with Spanner
Announcing multi-subnet support for more scalable GKE clusters
From legacy to cloud: How Deutsche Telekom went from PySpark to BigQuery DataFrames
Amazon Braket introduces program sets enabling customers to run quantum programs up to 24x faster
How Karrot built a feature platform on AWS, Part 1: Motivation and feature serving
First
Prev.
126
127
128
129
130
131
132
Next
Last