Silver Spring, MD, USA
Feb 4, 2019 | By CloudSploit
When we talk about cloud providers, we often forget that not all data is the same — even in the same application, while we might think of this data as from a “financial application” or a “computation process”, the reality is that each data set has subsets upon subsets, and thus require specific applications to manage them.
Dec 2, 2018 | By CloudSploit
Yet another Re:Invent has concluded, leaving behind a trail of announcements, new features, and vendor swag (how many T-shirts can we possibly own?). Security was a hot topic at this year’s conference; so much so that it was mentioned in-depth within the first 10 minutes of Andy Jassy’s keynote and numerous times afterwards, as well as during Werner Vogel’s keynote the following day.
Apr 8, 2018 | By CloudSploit
One of the most common business requirements data handlers face is the numerous data privacy standards present as industry standards. Each industry has their own variation, each with their own specific requirements — but regardless of the standard or the applied dataset, compliance is extremely important.
Jan 6, 2018 | By CloudSploit
In many ways, AWS is often seen as a leader in the cloud space. This is for good reason — AWS represents a wide range of business, small and large, as well as a variety of individual users, and as such, where AWS goes in terms of trend is largely where the industry trend itself is going.
Aug 29, 2018 | By CloudSploit
CloudSploit's AWS Security scanning service requires a third-party cross-account role with an external ID. Learn how to connect your AWS account securely to CloudSploit.
May 25, 2018 | By CloudSploit
CloudSploit's AWS CloudFormation Security Scanner can detect security risks in your JSON or YAML CloudFormation templates before they are deployed to your environments.