Source:


By Nicholas Fearn

An AWS tech stack can aid business growth and facilitate efficient operations, but misconfigurations have become all too common and stall this progress

Amazon Web Services (AWS) has become the lifeblood of millions of modern businesses, both big and small. But while this popular cloud platform enables them to manage and scale their operations with impressive speed, simplicity and affordability, it also represents a significant security and privacy risk if mismanaged by users.

An insecure or improperly configured AWS tech stack provides a gateway for cyber criminals to enter corporate systems and sensitive files. The biggest example of this occurred in 2019, when an ex-Amazon employee stole the data of 100 million Capital One customers simply by exploiting a misconfigured web application firewall in the financial service giant’s AWS tech stack.

The incident ended with a high-profile lawsuit in which the financial services giant had to pay a $190m (£140m) settlement to affected customers. Other big businesses impacted by similar incidents include Accenture, Facebook, LinkedIn, Pegasus Airlines, Uber and Twilio. So, what can organisations do to secure their AWS tech stacks?

One of the biggest risks of an insecure AWS tech stack is data theft and exfiltration by cyber criminals, according to Rik Turner, chief cyber security analyst at Omdia. He explains this can happen when S3 buckets, which contain large volumes of files and sensitive metadata, aren’t set up properly.

As a result, S3 bucket access rights can be granted to employees who don’t require them for their roles, leading to insider threats. Or, worse, these crucial storage objects can end up on the public internet for anyone to access and abuse.

Sensitive corporate and customer data exposed in this way can lead to businesses experiencing “enormous financial losses”, says Sylvester Kaczmarek, a professor at online higher education provider the Open Institute of Technology. Their finances take a hit through regulatory fines, customer lawsuits and expensive recovery efforts that can last for months. Reputational damage is often substantial, too.

Additionally, weak or reused user credentials, the absence of cyber security logging and monitoring capabilities, and weaknesses in cyber defences like firewalls leave AWS tech stacks dangerously exposed to data breaches, he adds.

Data breaches can also stem from poorly secured Relational Database Service databases, Elastic Compute Cloud (EC2) instances and application programming interfaces, explains Bob McCarter, chief technology officer of risk and compliance software provider Navex. Erroneous identity and access management policies, a lack of multi-factor authentication, unpatched software and open ports are common security issues affecting these AWS services.

Besides costly data breaches, the day-to-day operations of modern businesses can grind to a halt in the aftermath of an EC2 instance compromise. The latter results in “impaired performance”, and even “a complete malfunctioning” of critical applications and workloads, explains Turner.

These issues are largely the product of mistakes made by AWS users and not cyber attacks targeted at Amazon, according to Neil MacDonald, vice-president and distinguished analyst at Gartner. But he emphasises that mistakes can easily happen due to the “sheer size, complexity and rate of change of AWS deployments”, adding that they are “impossible” to monitor without using appropriate security tools from AWS or other technology companies.

It is, therefore, the responsibility of AWS users to take steps to protect the data they upload to AWS cloud resources. This is enshrined in the cloud security shared responsibility model, with the responsibility of cloud companies like AWS being to secure the infrastructure they sell to customers.

Best practices to secure AWS tech stacks

When it comes to securing AWS tech stacks, many effective best practices are laid out in the AWS Well-Architected framework. McCarter explains that it offers a comprehensive guide for access management, infrastructure management, data privacy, application security, and cyber threat monitoring and detection.

Crystal Morin, cyber security strategist at cloud security company Sysdig, is another vocal supporter of this framework. She says it’s great for handling the prevention, protection, detection and response sides of cyber security. “This model helps you think through how to prevent problems in the first place, ensure your workloads have security in place, and then have the right tools in place to detect and respond to cloud security threats if and when they do take place,” says Morin.

As well as adhering to AWS’s own security best practices, MacDonald points out that the Center for Internet Security also offers advice for creating and maintaining a secure AWS tech stack. He adds that many modern cyber security tools are aligned with the latest AWS best practices, whether provided by Amazon or an outside organisation.

Given that lots of AWS-related security incidents are caused by inadequate access controls, Jake Moore – global cyber security advisor at antivirus maker ESET – urges organisations to implement the principle of least privilege to ensure access rights are limited to those who require them for their roles. This should be enforced as part of a wider identity and access management strategy.

Of course, staff hiring, attrition and promotion can make it difficult to manage AWS access controls. Still, Moore says businesses can use cyber security monitoring tools to track these changes and ensure access controls are amended accordingly, minimising security incidents. In addition to investing in these tools, he urges organisations with AWS stacks to regularly audit their cyber security posture to ensure security gaps are identified and closed swiftly. Automated analysis tools can help with this.

To ensure cyber criminals can’t steal sensitive data stored on and travelling between AWS servers, OPIT’s Kaczmarek says organisations must encrypt data when it’s at rest and in transit. Utilising the AWS Key Management service will help protect data at rest. Meanwhile, tight network security configurations are the key to securing transit data and wider network traffic. These should apply for virtual private clouds, Security Groups and Network Access Control Lists, according to Kaczmarek.

Organisations operating AWS tech stacks can log all network traffic using AWS CloudTrail and monitor it using AWS CloudWatch, says Kaczmarek. He adds that these efforts can be complemented by using multi-factor authentication, implementing security patches when they’re issued and replacing manual processes with infrastructure as code. The previous step is paramount for “consistency and auditing”, he claims.

 

Read the full article below:

Related posts

Times of Malta: Malta-based OPIT launches innovative AI tool for students, academic staff
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
Sep 22, 2025 5 min read

Source:

4 min read


The launch was officially unveiled during an event held at Microsoft Italia in Milan, titled AI Agents and the Future of Higher Education.

A tech-focused higher education institution based and accredited in Malta has developed a new AI assistant designed to support both students and faculty.

In a statement, the Open Institute of Technology (OPIT), announced the launch of the OPIT AI Copilot.

With the Fall Term starting on September 15, OPIT said it has already launched beta testing with faculty champions and is currently piloting full-course integrations.

Students who will be part of the pilot-phase will be able to prompt the entire OPIT – Open Institute of Technology knowledge base, personalized to their own progress.

The platform was developed entirely in-house to fully personalize the experience for the students, and also make it a real-life playground for in-class projects. It is among the first custom-built AI agents to be deployed by an accredited European higher education institution.

The launch was officially unveiled during an event held at Microsoft Italia in Milan, titled AI Agents and the Future of Higher Education

The gathering brought together academics and technology leaders from prominent European Institutions, such as Instituto de Empresa (IE University), OPIT itself and the Royal College of Arts, to explore how artificial intelligence is reshaping the university experience.

The OPIT AI Copilot has been trained on the institute’s complete academic archive, a collection created over the past three years that includes 131 courses, more than 3,500 hours of recorded lectures, 7,500 study resources, 320 certified assessments, and thousands of exercises and original learning documents.

Unlike generic AI tools, the Copilot is deeply integrated with OPIT’s learning management system, allowing it to track each student’s progress and provide tailored support.

This integration means the assistant can reference relevant sources within the learning environment, adapt to the student’s stage of study, and ensure that unreleased course content remains inaccessible.

A mobile app is also scheduled for release this autumn, that will allow students to download exercise and access other tools.

During examinations, the Copilot automatically switches to what the institute calls an “anti-cheating mode”, restricting itself to general research support rather than providing direct answers.

For OPIT’s international community of 500 students from nearly 100 countries, many of whom balance studies with full-time work, the ability to access personalised assistance at any time of day is a key advantage.

“Eighty-five per cent of students are already using large language models in some way to study,” said OPIT founder and director Riccardo Ocleppo. “We wanted to go further by creating a solution tailored to our own community, reflecting the real experiences of remote learners and working professionals.”

Tool aims to cut correction time by 30%

The Copilot will also reduce administrative burdens for faculty. It can help grade assignments, generate new educational materials, and create rubrics that allow teachers to cut correction time by as much as 30 per cent.

According to OPIT, this will free up staff to dedicate more time to teaching and direct student engagement.

At the Milan event, Rector Francesco Profumo underlined the broader implications of AI in higher education. “We are in the midst of a deep transformation, where AI is no longer just a tool: it is an environment that radically changes how we learn, teach, and create,” he said.

“But it is not a shortcut. It is a cultural, ethical, and pedagogical challenge, and to meet it we must have the courage to rethink traditional models and build bridges between human and artificial intelligence.”

OPIT was joined on stage by representatives from other leading institutions, including Danielle Barrios O’Neill of the Royal College of Art, who spoke about the role of AI in art and creativity, and Francisco Machin of IE University, who discussed applications in business and management education.

OPIT student Asya Mantovani, also employed at a leading technology and consulting firm in Italy,  gave a first-hand account of balancing professional life with online study.

The assistant has been in development for the past eight months, involving a team of OPIT professors, researchers, and engineers.

Ocleppo stressed that OPIT intends to make its AI innovations available beyond its own institution. “We want to put technology at the service of higher education,” he said.

“Our goal is to develop solutions not only for our own students, but also to share with global institutions eager to innovate the learning experience in a future that is approaching very quickly.”

Read the full article below:

Read the article
E-book: AI Agents in Education
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
Sep 15, 2025 3 min read

From personalization to productivity: AI at the heart of the educational experience.

Click this link to read and download the e-book.

At its core, teaching is a simple endeavour. The experienced and learned pass on their knowledge and wisdom to new generations. Nothing has changed in that regard. What has changed is how new technologies emerge to facilitate that passing on of knowledge. The printing press, computers, the internet – all have transformed how educators teach and how students learn.

Artificial intelligence (AI) is the next game-changer in the educational space.

Specifically, AI agents have emerged as tools that utilize all of AI’s core strengths, such as data gathering and analysis, pattern identification, and information condensing. Those strengths have been refined, first into simple chatbots capable of providing answers, and now into agents capable of adapting how they learn and adjusting to the environment in which they’re placed. This adaptability, in particular, makes AI agents vital in the educational realm.

The reasons why are simple. AI agents can collect, analyse, and condense massive amounts of educational material across multiple subject areas. More importantly, they can deliver that information to students while observing how the students engage with the material presented. Those observations open the door for tweaks. An AI agent learns alongside their student. Only, the agent’s learning focuses on how it can adapt its delivery to account for a student’s strengths, weaknesses, interests, and existing knowledge.

Think of an AI agent like having a tutor – one who eschews set lesson plans in favour of an adaptive approach designed and tweaked constantly for each specific student.

In this eBook, the Open Institute of Technology (OPIT) will take you on a journey through the world of AI agents as they pertain to education. You will learn what these agents are, how they work, and what they’re capable of achieving in the educational sector. We also explore best practices and key approaches, focusing on how educators can use AI agents to the benefit of their students. Finally, we will discuss other AI tools that both complement and enhance an AI agent’s capabilities, ensuring you deliver the best possible educational experience to your students.

Read the article