Welcome to above the clouds

AWS – Introducing Fine-grained access controls with job-scoped IAM Roles and Integration with AWS Lake Formation for Apache Spark and Apache Hive on Amazon EMR on EC2 Clusters
We are excited to launch two new features that help enforce access controls with Amazon EMR on EC2 clusters (EMR Clusters). These features are supported with jobs that are submitted to the cluster using the EMR Steps API. First is Runtime Role with EMR Steps. A Runtime Role is an AWS Identity and Access Management […]

AWS – AWS Managed Services is now available in Asia Pacific (Hong Kong) and Middle East (Bahrain) Regions
AWS Managed Services (AMS) Accelerate Operations Plan is now available in Asia Pacific (Hong Kong) and Middle East (Bahrain) Regions. AMS helps you operate AWS efficiently and securely. It provides proactive, preventative, and detective capabilities that raise the operational bar and help reduce risk without constraining agility, allowing you to focus on innovation. AMS extends […]

Azure – Generally available: Live resize for Premium SSD and Standard SSD Disk Storage
Dynamically increase your disk storage capacity without any application downtime with the Azure Disk Storage live resize feature. Read More for the details.

GCP – A new Google Cloud region is coming to Mexico
Last month, Google announced a five-year, $1.2 billion USD commitment to Latin America to expand digital infrastructure, support digital skills, foster an entrepreneurial ecosystem, and help create inclusive and sustainable communities. To build on these initiatives and meet the growing demand for cloud services around the world, we are excited to announce that a new […]

AWS – AWS Transfer Family now supports ED25519 and ECDSA keys for user authentication
AWS Transfer Family customers can now use ED25519 and ECDSA keys to authenticate users connecting to an AWS Transfer Family server. Previously, Transfer Family only supported RSA keys for user authentication. Read More for the details.

GCP – Standing shoulder to shoulder – building a resilient healthcare ecosystem with Health-ISAC
Building a resilient healthcare ecosystem is not something done within a vacuum. It takes motivated organizations and people working together in a community of trust to build and defend effectively. We believe the more diverse these communities are, the more effective they can be. Last August, Google announced its commitment to invest at least $10 […]

AWS – AWS IoT Device Client v1.7 now available with enhanced functionality and security features
The AWS IoT Device Client is a free, open-source, and modular device-side reference implementation written in C++ that you can compile and install on IoT devices. It allows device developers to access AWS IoT Core, AWS IoT Device Management, and AWS IoT Device Defender features with minimal device side code. The Device Client works on […]

GCP – The Invisible Cloud: How this Googler keeps the internet moving worldwide
Editor’s note: Google Cloud runs on people like Stacey Cline. As Global Contract Management Lead in our Global Logistics Operations, she enables the worldwide movement of global technical infrastructure – the servers, the storage, the artificial intelligence pods, and everything else that keeps Google Cloud serving enterprises and individuals 24/7. A native of Trinidad & […]

GCP – Using Cloud Bigtable with IAM Conditions and Tags
Cloud Bigtable is a low-latency, high-throughput NoSQL database. Bigtable users store terabytes of data in their tables, and exposing the data securely is essential for Bigtable users. If you are an administrator or developer responsible for securing access to your Bigtable data, you are likely utilizing Google Cloud security features to lock down the Bigtable […]
GCP – How Google Cloud SecOps can help solve these 6 key MSSP conundrums
Editor’s note: This blog was originally published by Siemplify on October 6, 2021. The COVID-19 pandemic accelerated many organizations’ timelines to transition to the cloud and advance their digital transformation efforts. The potential attack surfaces for those organizations also grew as newly distributed workforces used unmanaged technologies. While some organizations thrived, the transition further exacerbated […]