Author name: auto feeder

NIS2 Directive Explained: Duty of Care for Data

What is the Network and Information System Directive 2? In the digital age, cybersecurity is not just about protecting data; it is about ensuring the very fabric of our critical infrastructure remains intact and resilient against threats. The introduction of the Network and Information Security Directive 2 (NIS2) by the European Union marks a significant …

NIS2 Directive Explained: Duty of Care for Data Read More »

AWS Weekly Roundup: Passkey MFA, Malware Protection on Amazon S3, and more (June 17, 2024)

Last week, my alma mater Standard Bank Group (SBG) hosted a Software Engineering Conference and invited me to be one of the keynote speakers. SBG has presence throughout Africa and this hybrid conference was attended by almost 2,000 engineers from across the continent. It was amazing to reconnect with long-time friends and former colleagues, and …

AWS Weekly Roundup: Passkey MFA, Malware Protection on Amazon S3, and more (June 17, 2024) Read More »

Multi-Cloud Strategy: Secure Data & Compliance 

Businesses are increasingly turning to the cloud for agility, scalability, and innovation. While relying on a single cloud provider was the norm in the past, many organizations recognize the advantages of a multi-cloud strategy. A multi-cloud approach involves utilizing services from multiple cloud providers, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud …

Multi-Cloud Strategy: Secure Data & Compliance  Read More »

Veeam and Nutanix AHV: Navigating the Hypervisor Landscape

At one point, the hypervisor of choice was essentially non-debatable when it came to enterprise data estates. Market share and competitive prices made the choice much simpler in many cases; and if public cloud offerings were not in the mix, the choice often boiled down to three-or-so hypervisors. Today, anyone in the industry, whether an …

Veeam and Nutanix AHV: Navigating the Hypervisor Landscape Read More »

Enhancing Cyber Resilience Through IT and Security Collaboration

Cybersecurity threats are becoming increasingly complex and sophisticated and pose significant risks to organizations of all sizes. This evolving threat landscape includes a range of challenges such as advanced persistent threats (APTs), ransomware, phishing attacks, and zero-day vulnerabilities. These threats are often orchestrated by well-funded and highly skilled adversaries who employ sophisticated techniques to breach …

Enhancing Cyber Resilience Through IT and Security Collaboration Read More »

AWS Audit Manager extends generative AI best practices framework to Amazon SageMaker

Sometimes I hear from tech leads that they would like to improve visibility and governance over their generative artificial intelligence applications. How do you monitor and govern the usage and generation of data to address issues regarding security, resilience, privacy, and accuracy or to validate against best practices of responsible AI, among other things? Beyond …

AWS Audit Manager extends generative AI best practices framework to Amazon SageMaker Read More »

Scroll to Top