Tagged articles
2 articles
Page 1 of 1
AntTech
AntTech
Oct 16, 2025 · Information Security

How Alipay’s Trusted Deep Defense System Secures Financial Transactions

Alipay’s trusted deep defense architecture, built on security parallel slices and trusted computing, was selected as a flagship case for the 2025 Important Industry Security Protection list, demonstrating zero‑false‑positive, zero‑miss, and zero‑business‑disruption protection against advanced threats such as 0‑day and APT attacks during high‑traffic events like Double 11.

Deep DefenseZero Trustcybersecurity
0 likes · 5 min read
How Alipay’s Trusted Deep Defense System Secures Financial Transactions
Efficient Ops
Efficient Ops
Jan 4, 2017 · Information Security

How Deep Defense and Log Analysis Can Thwart Intrusions

This article explains Google’s BeyondCorp concept, the need for deep defense of internal and perimeter networks, and provides practical Linux scripts for monitoring processes, ports, command usage, system events, file changes, and SFTP activity to detect and mitigate host intrusions.

Deep DefenseLinux monitoringhost intrusion detection
0 likes · 10 min read
How Deep Defense and Log Analysis Can Thwart Intrusions