Useful New IAM Feature – Access Key Last Use Info

Best practices for IT security are often easier to define than to implement. We are doing our best to define best practices at the AWS Security Center, backed up with services and security features that are as easy to implement as possible. In this vein, I want to...

Hack PR for Your Startup With These 5 Tools

Apparently, you can hack anything these days. I just read an article that taught me 9 Hacks to Making a Sandwich Faster. (Don’t ask why I read it, it just sucked me in. Plus, who doesn’t want to eat anything sooner?) Press is cool because you never know who’s going to...

Have you enabled two-step verification?

We want to encourage everyone to be proactive about their security online. That’s why we’re supporting National Cybersecurity Awareness Month by sharing simple steps you can take to protect your accounts.   Even if a website or app has strong security controls, your...