Technology is omnipresent in our lives. From the time you wake up and check the weather to the time your head hits the pillow, you will have spent at least a quarter of your day interacting with technology. What are the privacy and security implications?
Google really doesn't like humans and they LOVE data. At the intersection of those two areas is a new A.I assistant that calls business to complete simple tasks for it's users and to automatically update Google's databases: enter Google Duplex.
S01E01 - Host, Mark Nunnikhoven, interviews Jeff Westphal and Fernando Cardoso. Together they focus on the problems that solution architects and security engineers tackle in the real world.
Amazon DynamoDB is an exciting database services. It's a cloud-native, NoSQL offering that is lightning quick and scales seamlessly. However, if you treat it like a traditional RDBMS, you're not going to see any of those benefits. In this live stream, I explore some mistakes I've
AWS offers a wide range of databases but making sense of these services can be tricky. In this live stream, we explore these data services and why you pick one over another.
Getting users to accept new security controls is an uphill battle, any setback makes it harder for any solution to push out additional security measures.
Mistakes happen. Even after taking steps to restrict permissions and setup systems, builders will make misconfigurations and mistakes. This stream presents two different approaches to catch those mistakes before they come back to haunt you.
AWS re:Invent is absolutely massive. The only way to keep things somewhat organized is to use a reserved seating system for sessions. That system opened today and I live streamed the ins and outs of booking seats for various events.
Serverless architectures help you and your team focus almost entirely on delivering business value. They also break almost every existing security technique. I've been actively researching serverless security for a while now, here's what I've learned over the past three years.
Cybersecurity is topic that comes up regularly as something you <em>have</em> to door should door are forced to look at by your security team. But why? There have been reports of serverless threats. Rumours of traditional security issues that should keep you up at night. Is any of it real?
Serverless is hot right now, but are we all talking about the same thing? In this live stream, we dive into what serverless is, why it's a big win for your business, and how to get started.
Security is often misunderstood and addressed in the last stages of a build. Operationally, it’s ignored until there is an emergency. In this talk, we review several advanced security processes and discuss how too easily automate them using common tools in the AWS Cloud.