BLOG

The Latest News & Insights

    Protect Your Amazon S3 Buckets

    There is no doubt that as each day goes by, more and more data is migrating into cloud storage. The public cloud, or Infrastructure as a Service (IaaS) as some call it, has become the new normal. Out of all the data store service providers out there like Azure Blob Storage and Google Cloud Storage, the largest by far is Amazon Simple Storage Service (Amazon S3). It has gotten so large that AWS acknowledged their store capacity in the excess of exabytes of storage and trillions of objects. Imagine the size of the earth is measured as one gigabyte. Then the size of the sun would be equivalent to an exabyte. It’s hard to imagine...

    S3 malware scanning is essential for businesses of all sizes. Learn here about more Amazon S3 Security best practices.
    Amazon S3 Security Best Practices

    The Shared Responsibility Model for Object Storage As malware attack vectors continue to grow and more and more security features are built above and below the delineation of “Security of the Cloud” (provided by AWS) and “Security in the Cloud” (your job), security teams will need to ensure a proper framework to protect their applications and data.

     Cloud Storage Security Amazon S3, and Securing Data
    Antivirus for Amazon S3, the Blind Spot in Cloud Storage

    Positively impacting shareholder value is every CEO’s dream. Negatively impacting shareholder value is every CISO’s nightmare. As more and more data moves to the cloud, additional threat vectors to customer data must be considered. Threats that include malware and viruses for Amazon S3. At the 2018 AWS re:Invent Keynote, AWS S3 VP, Mai-Lan Tomsen Bukovec acknowledged the “tens of trillions of objects” exceeding “exabytes of storage” are being used on Amazon S3. It is hard not to argue Amazon S3 is one of the most successful services provided by AWS. AWS has unlimited emphasis ensuring your data is safe. Customers and AWS leverage many native features and security frameworks including redundancy, bucket permissions, encryption and duplication across regions and availability zones.

    Tired of Reading?

    Want to watch something instead?

    Website_Case_Studies_Watch_Video (3)