Welcome to above the clouds
GCP – Cybercrime: A Multifaceted National Security Threat
Executive Summary Cybercrime makes up a majority of the malicious activity online and occupies the majority of defenders’ resources. In 2024, Mandiant Consulting responded to almost four times more intrusions conducted by financially motivated actors than state-backed intrusions. Despite this overwhelming volume, cybercrime receives much less attention from national security practitioners than the threat from […]
AWS – Amazon DynamoDB now supports auto-approval of quota adjustments
You can now request for Amazon DynamoDB account-level and table-level throughput quota adjustments using AWS Service Quotas in all AWS Commercial Regions and the AWS GovCloud (US) Regions, and get auto-approved within minutes. Previously, when requesting a quota adjustment, Service Quotas allowed you to indicate the Amazon DynamoDB quota and desired value to be adjusted […]
AWS – Amazon Connect Contact Lens now provides a dashboard with aggregated insights on agent performance evaluations
Contact Lens now provides managers with an agent performance evaluation dashboard, to view aggregations of agent performance, and insights across cohorts of agents over time. With this launch, managers can access a unified dashboard on agent performance across evaluation scores, productivity (e.g., contacts handled, average handle time, etc.) and operational metrics. Through detailed performance scorecards […]
AWS – Amazon Connect Contact Lens can now take automated actions based on hold times and agent interaction time
Amazon Connect Contact Lens now enables managers to create rules based on patterns of customer hold time and agent interaction duration, to take automated actions such as categorizing contacts, evaluating agent performance and notifying supervisors. With this launch, managers can create rules to check how well agents comply with guidelines on placing customers on hold. […]
AWS – AWS Secrets and Configuration Provider now integrates with Pod Identity for Amazon EKS
Today, AWS Secrets Manager announces that AWS Secrets and Configuration Provider (ASCP) now integrates with Amazon Elastic Kubernetes Service (Amazon EKS) Pod Identity. This integration simplifies IAM authentication for Amazon EKS when retrieving secrets from AWS Secrets Manager or parameters from AWS Systems Manager Parameter Store. With this new capability, you can manage IAM permissions […]
GCP – Balance of power: A full-stack approach to power and thermal fluctuations in ML infrastructure
The recent explosion of machine learning (ML) applications has created unprecedented demand for power delivery in the data center infrastructure that underpins those applications. Unlike server clusters in the traditional data center, where tens of thousands of workloads coexist with uncorrelated power profiles, large-scale batch-synchronized ML training workloads exhibit substantially different power usage patterns. Under […]
AWS – Amazon RDS for SQL Server supports new minor version in January 2025
A new minor version of Microsoft SQL Server is now available on Amazon RDS for SQL Server, providing performance enhancements and security fixes. Amazon RDS for SQL Server now supports this latest minor version of SQL Server 2022 across the Express, Web, Standard, and Enterprise editions. We encourage you to upgrade your Amazon RDS for […]
AWS – Amazon EFS now supports up to 10,000 access points per EFS file system
Amazon Elastic File System (Amazon EFS) has now increased the access points limit from 1,000 to 10,000 per file system, a 10x increase. This launch makes it even easier for customers to manage application-specific access to shared datasets, enabling them to seamlessly scale access management to thousands of users, on a single EFS file system. […]
AWS – Amazon CloudWatch now provides lock contention diagnostics for Aurora PostgreSQL
Amazon CloudWatch Database Insights now provides lock contention diagnostics for Aurora PostgreSQL instances. This feature helps you identify the root cause behind both ongoing and historical lock contention issues within minutes. The lock contention diagnostics feature is available exclusively in the Advanced mode of CloudWatch Database Insights. With this launch, you can visualize a locking […]
GCP – 5 ways Google Cloud can help you minimize credential theft risk
Threat actors who target cloud environments are increasingly focusing on exploiting compromised cloud identities. A compromise of human or non-human identities can lead to increased risks, including cloud resource abuse and sensitive data exfiltration. These risks are exacerbated by the sheer number of identities in most organizations; as they grow, the attack surface they represent […]
