How to secure AWS CDK deployments with Bitbucket & OIDC

Discover how to securely deploy AWS CDK projects using Bitbucket Pipelines and OpenID Connect without storing static credentials.
AI in DevSecOps – Part 1: Fundamentals of AI

Explore how AI and Generative AI are transforming DevSecOps practices and workflows.
Deep Dive into AWS Transfer Family

Discover how AWS Transfer Family can modernise secure file transfers with a fully managed, scalable and cloud-native approach.
Enhancing DevSecOps maturity with the OWASP Software Assurance Maturity Model

Explore how Cevo helps customers enhance DevSecOps maturity by embedding security into software delivery using OWASP SAMM.
General availability of Amazon VPC route server

Discover how Amazon VPC Route Server simplifies cloud networking by dynamically updating VPC route tables, reducing administrative overhead and complexity.
A beginner’s guide to AWS Aurora Data API

Explore how AWS Aurora Data API simplifies database connectivity for serverless applications, enabling secure and scalable interactions without persistent connections.
AI isn’t always the answer: When Generative AI is not it

Explore when Generative AI isn’t the best tool and why traditional machine learning models often provide better solutions in specific scenarios.
Reducing risk: Why engaging an AWS partner matters to your business

Explore how an AWS Partner can help navigate complex Control Tower errors and AWS Organizations migrations, ensuring a smoother cloud journey.
Understanding and optimising AWS Config costs

Explore how AWS Config billing works, identify cost-driving factors, and learn practical strategies to optimise costs using Amazon Athena.
Building a Secure Code Analysis Application with AWS Bedrock and CloudFormation

Explore how to build a secure, AI-powered code analysis application with AWS Bedrock and CloudFormation, ensuring compliance and efficiency for enterprise environments.