How does AWS collect and take action on threat intelligence, and how does it become part of a service? In this session, walk through the collection, verification, and collation of threat intelligence and how it becomes part of a service offering, using AWS Managed Rules for AWS WAF as an example. Learn about AWS threat collection, and discover how to use services like AWS WAF to customize your posture to reflect your security considerations.
Learn more about AWS re:Inforce at .
Subscribe:
More AWS videos:
More AWS events videos:
ABOUT AWS
Amazon Web Services (AWS) hosts events, both online and in-person, bringing the cloud computing community together to connect, collaborate, and learn from AWS experts.
AWS is the world's most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster.
#reInforce2023 #AWSEvents