heart Posts from the community...
Link
@faun shared a link, 4 days, 4 hours ago

We discovered an AWS access vulnerability

AWS IAM was used extensively by Stedi to enforce role-based access control for customers. A vulnerability was discovered in AWS STS where role trust policy statements were evaluated incorrectly, allowing unauthorized access to AWS accounts. Stedi shared their discovery process and collaboration with..

We discovered an AWS access vulnerability
Link
@faun shared a link, 4 days, 4 hours ago

How to Build a Data Center in 5 Steps

Establishing internal network infrastructure: Configuring a robust internal network infrastructure is key to efficient data center operations. This involves setting up switches, routers, and firewalls to manage data flow and protect against intrusions. Redundancy is critical for ensuring high availa..

How to Build a Data Center in 5 Steps
Link
@faun shared a link, 4 days, 4 hours ago

Why Fugaku, Japan’s fastest supercomputer, went virtual on AWS

The supercomputer Fugaku, developed by Japan's RIKEN Center for Computational Science, is now available on the Amazon Web Services (AWS) Cloud for easier access. Fugaku has been used for various societal needs, from COVID-19 simulations to drug discovery and economic forecasting...

Why Fugaku, Japan’s fastest supercomputer, went virtual on AWS