Welcome to above the clouds

Azure – General availability: Network security groups support for private endpoints
Network security groups (NSGs) support for private endpoints is now generally available. Read More for the details.

AWS – AWS Trusted Advisor Priority is now generally available for AWS Enterprise Support customers
AWS Trusted Advisor Priority is now generally available for AWS Enterprise Support customers, helping IT leaders focus on key cloud optimization opportunities through curated recommendations prioritized by their AWS account teams. AWS Trusted Advisor provides recommendations that help you follow AWS best practices across cost optimization, performance, security, reliability, and service quotas. Read More for […]

GCP – Understanding basic networking in GKE – Networking basics
In this article we’ll explore the networking components of Google Kubernetes Engine (GKE) and the various options that exist. Kubernetes is an open source platform for managing containerized workloads and services and GKE is a fully managed environment for running Kubernetes on Google Cloud infrastructure. IP addressing Various network components in Kubernetes utilize IP addresses […]

AWS – Amazon Redshift announces federated SSO support with ease of use and security capabilities enhancements for Query Editor V2.
Amazon Redshift Query Editor v2 , a free web-based tool for data exploration and analysis using SQL, is now enhanced with additional ease of use and security capabilities. Amazon Redshift Query Editor v2 simplifies the process for admins and end-users to connect Amazon Redshift clusters using their Identity Provider(IdP). As an administrator, you now can […]

AWS – Announcing AWS Resilience Hub support for Elastic Load Balancing and Amazon Route 53 Application Recovery Controller
You can now use AWS Resilience Hub with Elastic Load Balancing (ELB) and Amazon Route 53 Application Recovery Controller readiness checks to help meet your application’s recovery objectives. Resilience Hub provides you with a single place to define, validate, and track the resilience of your applications so that you can avoid unnecessary downtime caused by software, […]

AWS – AWS Cost Anomaly Detection gets a simplified interface for anomaly exploration
Starting today, customers of AWS Cost Anomaly Detection will see a new interface in the console, where they view and analyze anomalies and their root causes. AWS Cost Anomaly Detection monitors customers’ spending patterns to detect and alert on anomalous (increased) spend, and to provide root cause analyses. Read More for the details.

AWS – Amazon Rekognition Custom Labels now offers the ability to copy trained computer vision models across AWS accounts
Amazon Rekognition Custom Labels is an automated machine learning (AutoML) service that allows customers to build custom computer vision models to classify and identify objects in images that are specific and unique to their business. Custom Labels does not require customers to have any prior computer vision expertise or knowledge. Read More for the details.

AWS – Amazon EC2 P4d Instances now available in AWS GovCloud (US) Region
We are excited to announce the availability of Amazon EC2 P4d instances in the AWS GovCloud (US) Region. P4d instances are optimized for applications in Machine Learning (ML) and High Performance Computing (HPC). Read More for the details.

GCP – How a Vulnerability Exploitability eXchange can help healthcare prioritize cybersecurity risk
Diagnosing and treating chronic pain can be complex, difficult, and full of uncertainties for a patient and their treating physician. Depending on the condition of the patient and the knowledge of the physician, making the correct diagnosis takes time, and experimenting with different treatments might be required. This trial-and-error process can leave the patient in […]
GCP – Announcing curated detections in Chronicle SecOps Suite
A critical component of any security operations team’s job is to deliver high-fidelity detections of potential threats across the breadth of adversary tactics. But increasingly sophisticated threat actors, an expanding attack surface, and an ever-present cybersecurity talent shortage make this task more challenging than ever. Google keeps more people safe online than anyone else. Individuals, […]