[Updated 2018-06-11.] You can assign multiple IP addresses to an EC 2 instance. Here is a brief summary that will get you started on using the most recent AWS capabilities.

Cybersecurity in the Age of the Machine
[Updated 2018-06-11.] You can assign multiple IP addresses to an EC 2 instance. Here is a brief summary that will get you started on using the most recent AWS capabilities.
During the upcoming AWS re:INVENT 2017 conference in Las Vegas (Nov. 27th – Dec. 1st), Amazon is going to present a major change to its cloud offering, one with enormous ramifications! Yes, you read that right—and yes, that exclamation mark is fully justified.
[Updated May 16, 2018] AWS and Microsoft, the two leaders in the race for the best cloud infrastructure, have recognized cyber security as a barrier of adoption. Cyber security professionals are weary of migrating workloads into public cloud environments as it may carry significant risks. Thus, Amazon and Microsoft have developed specialized services to help safeguard users’ cloud infrastructure and data.
This post discusses ways to mitigate cyber threats and launch a cyber defense on AWS and Azure.
In the universe of email and messaging, change is accelerating. The world of IT came up with a new marketable buzzword with earth-shaking repercussions: Unified Communications.
You are writing all these backups as individual EC2 snapshots and/or full AMIs on AWS EC2 but how can you actually use them, should disaster befall your data?
Here is how to do that on Linux.