Here are the fresh stories about product updates.
GDPR frameworks are the roadmaps to GDPR compliance. We’ve curated the top 10 GDPR frameworks to help organize your efforts to comply with GDPR. These easy to use visual GDPR frameworks provide an excellent source of how-to guides.
The first episode of a new Saleforces administator podcast, called Insights, covers how to use Saleforce dashboards as motivators, as well as some other pro tips.
Learn more about the recent CPU security flaws “Spectre” and “Meltdown” that have been present in most computers for nearly 20 years. Read how Google Cloud is making sure customers see minimal performance impact from these mitigations.
You can now develop your AWS Lambda function code using Go. Lambda lets you run code without provisioning and managing servers. With Lambda, you can use Go’s native tools to build and package your code.
You can now develop your AWS Lambda function code in C# using the .NET Core 2.0. Lambda lets you run code without provisioning and managing servers. You can use any of the .NET Core 2.0 libraries or frameworks when authoring your functions in Lambda.
Best practice advises that you only grant users the permissions that are required to perform a task. This often means designing IAM policies, this post shows how AWS Service Catalog can extend the very same best practice.
The AWS Certified Security – Specialty beta exam is open to anyone with an AWS Associate or Cloud Practitioner certification. It covers incident response, logging and monitoring, infrastructure security, identity and access management, and data protection. Register today – it will only be available until March 2, 2018.
Now, you can use the AWS Identity and Access Management (IAM) console in Korean. The IAM console is also available in English, French, Japanese, and Chinese. Using the IAM console, you can manage permissions for IAM users, groups, and roles (also known as IAM entities).
If you are running Atlassian Server or Data Center products, they recommend assessing your own IT environment for risks associated with the “Spectre” and “Meltdown” vulnerabilities. This includes browsers, operating systems and virtual computing infrastructure. They recommend you work closely with your IT staff and vendors to monitor these flaws.