Revolgy blog - AWS

Cloud security in 2026 (part 3): Securing generative AI on AWS and Google

We’ve already secured the business strategy and the identity architecture. Now, we face the final...

Read more

Cloud security in 2026 (part 2): Why identity is your new firewall

Your data now lives on servers you don’t own, it is accessed by employees working in coffee shops,...

Read more

Cloud security in 2026 (part 1): From shared responsibility to shared fate

If you are still using a security strategy from 2023, you have a problem. The old idea that the...

Read more

Cloud anomaly detection explained

In the realm of cloud computing, managing costs effectively is as crucial as leveraging its vast...

Read more

Revolgy achieves AWS Digital Workplace Competency Status

Prague, April 28, 2022 - Revolgy achieves Amazon Web Services (AWS) Digital Workplace Competency...

Read more

Complete guide for picking the right tool for Terraform Security Code Analysis

Are you puzzled from the wide range of choices of static analysis tools for Terraform? We looked at...

Read more

Advanced API Routing in EKS with Traefik, AWS LoadBalancer Controller and External-DNS

Have you been thinking about how to distribute incoming HTTP(S) (and TCP) requests in EKS? This...

Read more