Best Practices for Security, Identity, & Compliance
-
Identity & Access Management
-
Data Protection & Privacy
-
Infrastructure Protection
-
Compliance
-
Detection
-
Incident Investigation & Response

Cybersecurity Awareness Training
Help employees in your organization learn how to identify cybersecurity risks, including phishing, social engineering, and data privacy with this free, 15-minute training from Amazon. The training is offered in 11 languages, is compliant with the Web Content Accessibility Guidelines (WCAG) 2.1 AA, and includes completion certificates for compliance tracking. Deploy immediately from our website or implement our pre-packaged files in your organization’s LMS.
Total results: 341
- Date (Desc)
No results found.
Please select different criteria, check your spelling, or try different keywords.
-
Guide
NewReplatforming mainframe applications using a shared IBM Db2 database
A methodical, phased approach for replatforming COBOL applications by using existing IBM Db2 for z/OS tables as a bridge between legacy mainframe and modern cloud systems. This method minimizes data replication and avoids the risks associated with large-scale, abrupt transitions.Tags: High Performance Computing | Mainframes | Migration | Operating Systems
Security, Identity, & Compliance Blog Posts
Total results: 3800
-
by Sangavi P, 05/22/2025
-
by Salman Ahmed, Ankush Goyal, Sergio Barraza and Ravi Kumar, 05/21/2025
-
by Christian Castro and Scott McMillan, 05/21/2025
-
by Gokhul Srinivasan, Juli Hysenbelli and Sid Kandan, 05/21/2025
-
by Mohammad Tahsin, Felipe Lopez and Aswin Vasudevan, 05/21/2025
-
by Caleb Cecil and Caleb Hannon, 05/21/2025