Tagged articles
126 articles
Page 2 of 2
Programmer DD
Programmer DD
Apr 18, 2021 · Information Security

Why Your Enterprise Needs a Log Auditing System: Core Features & Deployment

This article explains what log auditing is, why a unified audit platform is essential for compliance and security operations, outlines its core goals, main functions such as unified collection, correlation analysis, real‑time alerts, forensic reporting, and describes typical deployment architectures and modules.

Log AuditingLog ManagementSIEM
0 likes · 8 min read
Why Your Enterprise Needs a Log Auditing System: Core Features & Deployment
Yang Money Pot Technology Team
Yang Money Pot Technology Team
Apr 1, 2021 · Frontend Development

Implementing Page-Level User Interaction Recording and Replay for Insurance Compliance Using rrweb, Puppeteer, and FFmpeg

This article details a compliance‑driven solution that records, replays, and merges user interaction videos across multiple insurance web pages by leveraging rrweb for event capture, Puppeteer for automated playback, and FFmpeg for video stitching, while addressing performance, storage, and privacy challenges.

Puppeteercomplianceffmpeg
0 likes · 18 min read
Implementing Page-Level User Interaction Recording and Replay for Insurance Compliance Using rrweb, Puppeteer, and FFmpeg
Liangxu Linux
Liangxu Linux
Jan 16, 2021 · Information Security

Essential Linux Security Hardening Checklist for System Administrators

This guide provides system administrators with a step‑by‑step checklist to audit and harden Linux operating systems, covering account management, password policies, service restrictions, filesystem permissions, logging configuration, and practical command examples for comprehensive security compliance.

HardeningLinuxSecurity
0 likes · 9 min read
Essential Linux Security Hardening Checklist for System Administrators
DevOps Cloud Academy
DevOps Cloud Academy
Dec 29, 2020 · Information Security

Understanding DevSecOps: Integrating Security into DevOps Practices

The article explains how DevSecOps extends DevOps by embedding security controls throughout the software lifecycle, outlines its key components, adoption steps, essential tools, implementation capabilities, and the business benefits of merging security with development and operations.

AutomationDevOpsDevSecOps
0 likes · 8 min read
Understanding DevSecOps: Integrating Security into DevOps Practices
Architects Research Society
Architects Research Society
Oct 23, 2020 · Information Security

Understanding Data Security Diagrams and Their Role in Enterprise Architecture

The article explains how data security diagrams map which participants can access specific enterprise data, discusses best practices such as using focused participant‑centric or external‑access diagrams, presents example tables and UML/BPMN and Archimate visualizations, and highlights their role in compliance and trust management.

TOGAFaccess controlcompliance
0 likes · 5 min read
Understanding Data Security Diagrams and Their Role in Enterprise Architecture
Programmer DD
Programmer DD
Sep 26, 2020 · Information Security

How to Build an Automated Security Compliance Auditing System with Django

This article introduces an open‑source security compliance auditing platform built with Django, MongoDB and Redis, detailing its architecture, data synchronization methods, configurable audit strategies, asset inventory, policy configuration, task scheduling, and provides deployment instructions and sample API usage for automating compliance checks across applications, databases and operating systems.

AutomationDjangoaudit
0 likes · 9 min read
How to Build an Automated Security Compliance Auditing System with Django
Architects Research Society
Architects Research Society
Sep 20, 2020 · Information Security

Introduction to Technical Risk Management

This guide explains what technical risk is, why it matters, and provides a step‑by‑step methodology for assessing, mitigating, and managing technology‑related risks—including lifecycle, compliance, and complexity considerations—to improve cost efficiency, agility, and security across the enterprise.

IT lifecyclecomplianceenterprise architecture
0 likes · 17 min read
Introduction to Technical Risk Management
Tencent Cloud Developer
Tencent Cloud Developer
Aug 3, 2020 · Information Security

Enterprise Data Security Risks, Encryption Techniques, and Tencent Cloud Data Security Solutions

The article outlines enterprise data‑security risks and regulatory demands, reviews symmetric, asymmetric and hash techniques, highlights cloud‑encryption and key‑management challenges, and presents Tencent Cloud’s comprehensive solutions—including KMS, BYOK, white‑box keys, virtual HSMs, and integrated database encryption—to protect data throughout its lifecycle.

Tencent Cloudcloud computingcompliance
0 likes · 20 min read
Enterprise Data Security Risks, Encryption Techniques, and Tencent Cloud Data Security Solutions
Architects Research Society
Architects Research Society
Jul 7, 2020 · Information Security

Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models

A Cloud Access Security Broker (CASB) sits between cloud service consumers and providers to enforce security, compliance, and governance policies, offering visibility, data protection, threat detection, and control over shadow IT, with various deployment modes and integration options for modern cloud environments.

CASBData ProtectionThreat Detection
0 likes · 15 min read
Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models
dbaplus Community
dbaplus Community
Apr 20, 2020 · Operations

Preventing Database Disasters: Key Lessons from the Zhengda Hospital Outage

The Zhengda Hospital HIS database outage, caused by unauthorized scripts and poor permission controls, sparked a detailed discussion on how to prevent reckless production testing, enforce proper authorization, design efficient yet secure workflows, improve outsourcing oversight, and build robust emergency and compliance practices.

Database operationsDevOpsProduction Security
0 likes · 12 min read
Preventing Database Disasters: Key Lessons from the Zhengda Hospital Outage
Top Architect
Top Architect
Mar 4, 2020 · Information Security

ISO 27001 Security Framework and Building an Enterprise Information Security System

This article explains why enterprises need information security, outlines the core security requirements such as data protection and business continuity, and presents a phased ISO 27001‑based roadmap—including short‑term, medium‑term goals, management policies, network segmentation, third‑party compliance, and budgeting—to establish a comprehensive security architecture.

ISO 27001complianceinformation security
0 likes · 6 min read
ISO 27001 Security Framework and Building an Enterprise Information Security System
Tencent Cloud Developer
Tencent Cloud Developer
Nov 15, 2019 · Information Security

Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance

China’s mandatory Cybersecurity Graded Protection System 2.0, effective Dec 1 2019, classifies information systems into five security levels, imposes legally enforceable technical and management controls—including encryption, trusted computing, and cloud requirements—and outlines a five‑step assessment, registration, remediation, and supervision process for enterprises to achieve compliance quickly.

Data Protectioncloud securitycompliance
0 likes · 15 min read
Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance
21CTO
21CTO
Aug 4, 2019 · Information Security

How GitHub Handles US Trade Sanctions: Export Controls Explained

GitHub detailed its response to US trade sanctions, outlining how its services—including GitHub.com and GitHub Enterprise Server—are subject to export regulations, what restrictions apply to users in sanctioned regions, and how developers can navigate compliance and appeal processes.

Export controlsGitHubUS Sanctions
0 likes · 9 min read
How GitHub Handles US Trade Sanctions: Export Controls Explained
Efficient Ops
Efficient Ops
Jun 4, 2019 · Information Security

What Is China’s Cybersecurity Level Protection 2.0 and How to Achieve Compliance?

The article explains China’s Network Security Level Protection 2.0 standard, its differences from 1.0, and provides practical guidance for internet companies on key compliance areas such as identity authentication, access control, security auditing, dynamic monitoring, and cloud security to strengthen overall cyber defenses.

ChinaLevel Protectioncompliance
0 likes · 5 min read
What Is China’s Cybersecurity Level Protection 2.0 and How to Achieve Compliance?
Tencent Database Technology
Tencent Database Technology
Jun 4, 2019 · Databases

From SEQUEL to JSON: Tracing the Evolution of SQL Standards

This article chronicles the origins, standardization process, historical milestones, learning resources, and conformance challenges of SQL standards, highlighting key ISO/IEC versions, the roles of major vendors, and the growing complexity of the language over more than three decades.

ANSIDatabase StandardsISO
0 likes · 11 min read
From SEQUEL to JSON: Tracing the Evolution of SQL Standards
21CTO
21CTO
May 21, 2019 · Information Security

Can GitHub Remain Safe Under US Export Controls? What It Means for Developers

The article examines recent U.S. export control measures targeting Huawei, their ripple effects on global chip and software suppliers, and the newly updated GitHub user agreement that subjects hosted code to U.S. export regulations, raising concerns about the safety and accessibility of open‑source projects for developers worldwide.

Export controlsGitHubUS Sanctions
0 likes · 8 min read
Can GitHub Remain Safe Under US Export Controls? What It Means for Developers
Efficient Ops
Efficient Ops
Mar 28, 2019 · Information Security

How Leading Tech Companies Audit and Control Ops Permissions

This article explains how large enterprises such as BAT and banks implement strict auditing and supervision of operational privileges, using personal accounts, command logging, OSSEC monitoring, firewall limits, and cross‑team oversight to enforce the principle of least privilege.

DevOpsOperationsPrivilege Management
0 likes · 6 min read
How Leading Tech Companies Audit and Control Ops Permissions
Efficient Ops
Efficient Ops
Jan 24, 2019 · Information Security

How Alibaba Scales Host Security Across Its Global Economic Ecosystem

This talk outlines Alibaba’s massive global host infrastructure, the evolving security governance from manual controls to data‑driven, automated systems, the challenges of compliance and operational efficiency, and future directions such as zero‑trust and invisible security.

Host SecurityOperationsSecurity Governance
0 likes · 16 min read
How Alibaba Scales Host Security Across Its Global Economic Ecosystem
DevOps
DevOps
Nov 5, 2018 · Information Security

Integrating Security into DevOps: Key Practices from the DevOps Handbook

This article summarizes essential DevSecOps concepts from the DevOps Handbook, explaining how to embed security throughout the software lifecycle—from making security a shared responsibility to integrating automated checks in development, testing, deployment pipelines, and change management—while highlighting real‑world examples and practical recommendations.

AutomationDevOpsDevSecOps
0 likes · 35 min read
Integrating Security into DevOps: Key Practices from the DevOps Handbook
21CTO
21CTO
Oct 28, 2018 · Fundamentals

Understanding Oracle’s Java SE 8 Licensing Changes and Cost Implications

Oracle announced that after January 2019 Java SE 8 will no longer receive public updates without a commercial license, prompting organizations to assess their Java usage, distinguish between general‑computing‑free and paid scenarios, and evaluate potential licensing costs and migration paths.

EnterpriseJavaJava SE8
0 likes · 6 min read
Understanding Oracle’s Java SE 8 Licensing Changes and Cost Implications
Efficient Ops
Efficient Ops
May 26, 2018 · Information Security

How the EU’s GDPR Redefines Data Privacy and Impacts Global Tech

The EU’s General Data Protection Regulation, effective May 25, dramatically expands data‑privacy rights, imposes strict obligations on all companies handling EU personal data—including non‑EU firms—introduces hefty fines, and reshapes how the internet industry balances advertising revenue with user protection.

EU RegulationGDPRcompliance
0 likes · 5 min read
How the EU’s GDPR Redefines Data Privacy and Impacts Global Tech
DevOps
DevOps
Mar 13, 2018 · Operations

DevOps: Overcoming Common Objections with Real‑World Case Studies

This article examines why many organizations doubt the feasibility of DevOps and continuous delivery, analyzes the root causes behind those doubts, and demonstrates through five detailed case studies how regulated environments, non‑web systems, legacy platforms, and cultural factors can all successfully adopt DevOps practices.

AutomationCase StudiesContinuous Delivery
0 likes · 18 min read
DevOps: Overcoming Common Objections with Real‑World Case Studies
iQIYI Technical Product Team
iQIYI Technical Product Team
Dec 22, 2017 · Product Management

Apple App Store Review Guidelines, Common Rejection Cases, and Lessons Learned

The article outlines Apple’s App Store Review Guidelines across safety, performance, business, design, and legal categories, highlights frequent iPhone client rejections such as metadata errors, preview video ads, IAP icon duplication, and missing UGC reporting, and proposes training, risk reporting, and a knowledge base to prevent future violations.

App StoreAppleReview Guidelines
0 likes · 13 min read
Apple App Store Review Guidelines, Common Rejection Cases, and Lessons Learned
dbaplus Community
dbaplus Community
Oct 9, 2017 · Information Security

How MongoDB Enables GDPR Compliance: Practical Data‑Protection Strategies

This article explains how MongoDB’s security features—including access control, authentication, encryption, data discovery, retention policies, zone sharding, backup, monitoring, and audit logging—help organizations meet GDPR requirements while minimizing operational overhead and ensuring data sovereignty.

BackupGDPRMongoDB
0 likes · 18 min read
How MongoDB Enables GDPR Compliance: Practical Data‑Protection Strategies
dbaplus Community
dbaplus Community
Sep 25, 2017 · Information Security

How GDPR Shapes Data Management Practices and Database Security

This article explains GDPR's key principles, the Discover‑Defend‑Detect framework, and concrete database controls such as data identification, retention, pseudonymisation, encryption, access control, disaster recovery, and audit logging needed to achieve compliance.

Audit loggingData ProtectionGDPR
0 likes · 12 min read
How GDPR Shapes Data Management Practices and Database Security