article thumbnail

AWS brings Amazon One palm-scanning authentication to the enterprise

TechCrunch

Amazon’s cloud computing subsidiary AWS (Amazon Web Services) has lifted the lid on a new palm-scanning identity service that allows companies to authenticate people when entering physical premises. Amazon One Enterprise, as the […] © 2023 TechCrunch.

article thumbnail

A secure approach to generative AI with AWS

AWS Machine Learning - AI

Because their data and model weights are incredibly valuable, customers require them to stay protected, secure, and private, whether that’s from their own administrator’s accounts, their customers, vulnerabilities in software running in their own environments, or even their cloud service provider from having access.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Using IAM Authentication for Redis on AWS

Dzone - DevOps

Amazon MemoryDB for Redis has supported username/password-based authentication using Access Control Lists since the very beginning. But you can also use IAM-based authentication that allows you to associate IAM users and roles with MemoryDB users so that applications can use IAM credentials to authenticate to the MemoryDB cluster.

article thumbnail

How to: Deploy Terraform to AWS with GitHub Actions authenticated with OpenID Connect

Xebia

In the past it was very common to use AWS credentials (access token and secret) in your GitHub actions pipeline. This poses a security risk because most of the time these AWS credentials are long-lived credentials with a lot of permissions. If these credentials get leaked or misused the damage done could be huge.

AWS 130
article thumbnail

ApatchMe - Authenticated Stored XSS Vulnerability in AWS and GCP Apache Airflow Services

Tenable

Unpatched Apache Airflow instances used in Amazon Web Services (AWS) and Google Cloud Platform (GCP) allow an exploitable stored XSS through the task instance details page. This vulnerability was previously reported and fixed by Apache; more information can be found here. We thank AWS and GCP for their cooperation and quick response.

article thumbnail

Cybersecurity Snapshot: Latest MITRE ATT&CK Update Offers Security Insights on GenAI, Identity, Cloud and CI/CD

Tenable

1 - New version of MITRE ATT&CK adds guidance on generative AI, cloud threats Information about malicious use of generative AI tools. Advice about securing cloud environments. Dive into six things that are top of mind for the week ending April 26. Recommendations for protecting software development pipelines. billion by year’s end.

article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. The exposure of personal or sensitive information can lead to identity theft, phishing attacks, and other forms of cybercrime. There is no silver bullet in cybersecurity.