PinnedMatthew VenneinITNEXTVPN is dead? Long live the Jump Host?Digesting the Supplemental Guidance for Proper Subnetting in FedRAMPMay 203May 203
PinnedMatthew VenneinITNEXTDemystifying Container Scanning Requirements for FedRAMP, DoD SRG, and CMMCWitMay 22, 2022May 22, 2022
Matthew VenneinITNEXTWhy Won’t My Phone Connect to Public WiFi?Understanding Captive Portals and an Ingenious Way to Trigger ThemMay 231May 231
Matthew VenneinITNEXTUnderstanding AI Risk Management — Securing Cloud Services with OWASP LLM Top 10Using Examples from AWS BedrockJan 4Jan 4
Matthew VenneinITNEXTNew Git Repo of Jupyter Notebooks for an Intro to GenAI on BedrockThere are a lot of folks who are looking to break into GenAI; however, there are a lot of concepts to learn, and it may be overwhelming…Jan 4Jan 4
Matthew VenneinITNEXTBuilding a RAG-enabled ChatBot using AWS Bedrock, Lex, and KendraIn case you haven’t heard, GenAI is the bees knees. When used properly, it can accelerate work product tremendously. Most folks are aware…Dec 13, 20232Dec 13, 20232
Matthew VenneinITNEXTUnderstanding Risk Assessment Standards for Deploying Safe & Ethical AI SystemsIt’s no secret that Cloud 2.0 will be driven by Artificial Intelligence (AI). The rate at which the world is adopting AI-based solutions is…Dec 12, 20231Dec 12, 20231
Matthew VenneinITNEXTStep Functions re:InventedTesting out the new Step Function features announced at AWS re:Invent 2023Dec 5, 20232Dec 5, 20232
Matthew VenneinITNEXTLeveraging Zero-Trust To Secure Your Network Management PlaneDeep Dive on CISA BOD 23–02Oct 26, 2023Oct 26, 2023