Tag

cloud security

0 views collected around this technical thread.

IT Architects Alliance
IT Architects Alliance
Mar 23, 2025 · Information Security

Cloud Architecture Security: Overlooked Hidden Vulnerabilities and Mitigation Strategies

The article examines the often‑ignored hidden vulnerabilities in cloud architectures—such as API flaws, misconfigurations, and third‑party service risks—illustrates real‑world incidents, explains why enterprises neglect these issues, and offers concrete measures to strengthen cloud security.

API vulnerabilitiescloud securityinformation security
0 likes · 10 min read
Cloud Architecture Security: Overlooked Hidden Vulnerabilities and Mitigation Strategies
Python Programming Learning Circle
Python Programming Learning Circle
Feb 6, 2025 · Artificial Intelligence

Key Technology Trends for 2025 and 2024: AI, DevOps, Cloud Security, and JavaScript Insights

This article summarizes major 2025 Gartner strategic technology trends, the 2024 DORA DevOps report, GitHub Octoverse findings, DataDog cloud‑security analysis, and the 2024 JavaScript state survey, highlighting AI advancements, cloud security challenges, developer productivity metrics, and emerging programming language popularity.

AIDevOpsJavaScript
0 likes · 14 min read
Key Technology Trends for 2025 and 2024: AI, DevOps, Cloud Security, and JavaScript Insights
AntTech
AntTech
Oct 22, 2024 · Information Security

Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications

The Asterinas open‑source confidential computing stack, released by leading Chinese research institutions and Ant Group, combines HyperEnclave, Occlum, and TrustFlow to provide a secure, nationally‑trusted TEE foundation for cloud, AI, and data‑intensive workloads, addressing the shortcomings of existing commercial TEEs and enabling trustworthy data flow across diverse industries.

Asterinascloud securityconfidential computing
0 likes · 8 min read
Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications
JD Tech Talk
JD Tech Talk
Jul 5, 2024 · Information Security

Analysis of CVE-2024-6387 OpenSSH Server Remote Code Execution Vulnerability and Enterprise Emergency Response Practices

The article examines the critical CVE-2024-6387 OpenSSH 0‑day remote code execution flaw, explains its technical details, and outlines JD Cloud's comprehensive emergency response, attack‑surface management, precise vulnerability intelligence, and managed security services to help enterprises mitigate such threats.

0dayCVE-2024-6387OpenSSH
0 likes · 11 min read
Analysis of CVE-2024-6387 OpenSSH Server Remote Code Execution Vulnerability and Enterprise Emergency Response Practices
Architects Research Society
Architects Research Society
Nov 12, 2023 · Information Security

What Is Shadow IT in Cloud Computing and How Does It Impact Enterprises?

Shadow IT refers to the unsanctioned use of cloud‑based applications and services by employees, which can introduce hidden costs, security vulnerabilities, compliance issues, and operational inefficiencies while also offering productivity gains, and the article explains its definition, risks, management strategies, statistics, and best practices.

Cloud ComputingShadow ITcloud security
0 likes · 19 min read
What Is Shadow IT in Cloud Computing and How Does It Impact Enterprises?
Laravel Tech Community
Laravel Tech Community
Aug 2, 2023 · Information Security

Top Open Source Vulnerability Scanners of 2023: Features, Pros, and Cons

This article reviews the best open‑source vulnerability scanners for web applications, databases, and infrastructure in 2023, detailing each tool’s key features, advantages, disadvantages, and guidance on who should or should not use them.

DevOpsOpen Source ToolsWeb Security
0 likes · 18 min read
Top Open Source Vulnerability Scanners of 2023: Features, Pros, and Cons
DevOps Cloud Academy
DevOps Cloud Academy
Oct 17, 2022 · Information Security

Tencent Cloud’s DevSecOps Practices and Open‑Source Governance – Conference Presentation

In a CIS2021 conference talk, Tencent Cloud’s product security lead outlines the company’s DevSecOps journey, detailing challenges of heterogeneous infrastructure, a risk‑introduction workflow, multi‑stage security evolution, tool integration, metrics, and open‑source governance practices.

DevSecOpsTencent Cloudcloud security
0 likes · 15 min read
Tencent Cloud’s DevSecOps Practices and Open‑Source Governance – Conference Presentation
Airbnb Technology Team
Airbnb Technology Team
Aug 26, 2022 · Information Security

Airbnb Data Privacy and Security Engineering: Inspekt Data Classification Service and Angmar Secret Detection

Airbnb’s second privacy‑security article describes how the Inspekt service automatically classifies personal and sensitive data across diverse stores using regexes, Aho‑Corasick tries, machine‑learning models and custom validators, measures validator quality, and how the Angmar system scans code repositories for secrets via CI checks and pre‑commit hooks, with plans to broaden coverage to more APIs and data stores.

Secret Detectioncloud securitydata classification
0 likes · 16 min read
Airbnb Data Privacy and Security Engineering: Inspekt Data Classification Service and Angmar Secret Detection
DevOps
DevOps
Aug 3, 2022 · Information Security

Secure Design in DevSecOps: Principles, Threat Modeling, and Huawei Cloud Practices

This article explains how integrating secure‑by‑design principles into DevSecOps accelerates software delivery while reducing risk, outlines key security architecture concepts such as the CIA triad and design principles, describes threat‑modeling methods, and showcases Huawei Cloud’s practical security design, data protection, and privacy solutions.

DevSecOpsHuawei CloudSecure Design
0 likes · 12 min read
Secure Design in DevSecOps: Principles, Threat Modeling, and Huawei Cloud Practices
Architects Research Society
Architects Research Society
Jul 26, 2022 · Information Security

Data Governance: Securing the Data Lifecycle in Cloud Environments

This article explains how enterprises can implement data governance to protect data throughout its lifecycle—collection, storage, processing, and deletion—especially in public and hybrid cloud settings, outlining SABSA categories, key questions, and practical considerations for secure data management.

Data GovernanceSABSAcloud security
0 likes · 6 min read
Data Governance: Securing the Data Lifecycle in Cloud Environments
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
May 31, 2022 · Information Security

Fidas: FPGA‑Based Comprehensive Offloading for Cloud Intrusion Detection (ISCA 2022 Full‑Score Paper)

The ISCA 2022 full‑score paper “Fidas: Fortifying the Cloud via Comprehensive FPGA‑based Offloading for Intrusion Detection” presents a novel FPGA‑accelerated IDS architecture that jointly offloads regex matching and traffic classification, achieving high flexibility, rapid rule updates, balanced load, and line‑rate performance in cloud data centers.

FPGAISCAIntrusion detection
0 likes · 7 min read
Fidas: FPGA‑Based Comprehensive Offloading for Cloud Intrusion Detection (ISCA 2022 Full‑Score Paper)
DataFunTalk
DataFunTalk
Jan 29, 2022 · Information Security

Data Security and Privacy-Enhancing Computing Solutions by Alibaba Cloud

This article outlines the current data security challenges and trends in digital transformation, presents Alibaba Cloud's privacy-enhancing computing approach with the DataTrust product, and details the DSMM framework, lifecycle protection, and practical solutions for secure data sharing and usage.

Alibaba CloudDataTrustcloud security
0 likes · 14 min read
Data Security and Privacy-Enhancing Computing Solutions by Alibaba Cloud
Beike Product & Technology
Beike Product & Technology
Jun 18, 2021 · Information Security

Zero Trust Network Architecture: Challenges, Principles, and Implementation Overview

This article outlines the limitations of traditional perimeter‑based IT security, introduces the Zero Trust philosophy and its six core principles, and presents a practical, layered architecture with components and prioritized steps for building a Zero Trust network in modern enterprises.

Access Controlarchitecturecloud security
0 likes · 12 min read
Zero Trust Network Architecture: Challenges, Principles, and Implementation Overview
Efficient Ops
Efficient Ops
Jun 17, 2021 · Information Security

Linus Torvalds Slams Anti‑Vaccine Rhetoric, New Cloud Malware, and Tech Market Shifts

The article reports Linus Torvalds’ harsh response to anti‑vaccine comments, recent global website outages, Tim Berners‑Lee’s NFT auction of the web’s source code, the discovery of a Windows Server container‑escaping malware, rapid growth in China’s industrial cloud market, forecasts for the global telecom cloud market, Microsoft’s upcoming Windows 10 end‑of‑support, Google’s custom video‑processing hardware for YouTube, and a massive Volkswagen customer data leak.

Linus TorvaldsWindows Server malwarecloud security
0 likes · 9 min read
Linus Torvalds Slams Anti‑Vaccine Rhetoric, New Cloud Malware, and Tech Market Shifts
AntTech
AntTech
Apr 6, 2021 · Information Security

Confidential Computing: Challenges, Solutions, and the Role of Rust in the SOFAEnclave Stack

The article explains how confidential computing, built on trusted execution environments like Intel SGX, addresses data‑in‑use security, outlines the technical hurdles developers face, and showcases Ant Group's open‑source SOFAEnclave components—Occlum, HyperEnclave, and KubeTEE—highlighting Rust’s pivotal contribution.

KubernetesRustSGX
0 likes · 13 min read
Confidential Computing: Challenges, Solutions, and the Role of Rust in the SOFAEnclave Stack
Architects' Tech Alliance
Architects' Tech Alliance
Jul 26, 2020 · Information Security

The Rise of Cloud Security: Market Trends, Challenges, and Competitive Landscape

Cloud security is emerging as a critical field, driven by rapid cloud adoption, evolving infrastructure, and increasing threats, with major vendors, startups, and traditional security firms competing through innovative SaaS solutions, partnerships, and acquisitions, while market forecasts predict substantial growth in the coming years.

Cloud ComputingIndustry TrendsSaaS
0 likes · 37 min read
The Rise of Cloud Security: Market Trends, Challenges, and Competitive Landscape
Architects Research Society
Architects Research Society
Jul 7, 2020 · Information Security

Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models

A Cloud Access Security Broker (CASB) sits between cloud service consumers and providers to enforce security, compliance, and governance policies, offering visibility, data protection, threat detection, and control over shadow IT, with various deployment modes and integration options for modern cloud environments.

CASBCompliancecloud security
0 likes · 15 min read
Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models
Tencent Cloud Developer
Tencent Cloud Developer
Nov 15, 2019 · Information Security

Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance

China’s mandatory Cybersecurity Graded Protection System 2.0, effective Dec 1 2019, classifies information systems into five security levels, imposes legally enforceable technical and management controls—including encryption, trusted computing, and cloud requirements—and outlines a five‑step assessment, registration, remediation, and supervision process for enterprises to achieve compliance quickly.

ComplianceGraded Protectioncloud security
0 likes · 15 min read
Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance
Efficient Ops
Efficient Ops
Jul 18, 2019 · Information Security

How DevOps Can Tackle the Growing Wave of Cloud Security Challenges

The article summarizes Chen Weijia’s DevOps International Summit talk on confronting expanding cloud security threats, covering DevSecOps practices, code scanning tools, encryption strategies, permission segmentation, and unified identity management to balance efficiency and security in modern software delivery.

CI/CDDevOpsDevSecOps
0 likes · 13 min read
How DevOps Can Tackle the Growing Wave of Cloud Security Challenges
360 Tech Engineering
360 Tech Engineering
Jun 10, 2019 · Information Security

Design and Practice of Big Data Platform Security: Insights from 360’s Data Center Technical Director

In this interview, 360’s Big Data Center Technical Director Xu Hao discusses the critical data security challenges faced by enterprises, outlines regulatory, system‑level, and managerial risks, and shares practical strategies for building robust security governance, platform architecture, permission controls, and cloud‑based data protection.

Big DataRisk Mitigationcloud security
0 likes · 13 min read
Design and Practice of Big Data Platform Security: Insights from 360’s Data Center Technical Director