Tagged articles
24 articles
Page 1 of 1
SuanNi
SuanNi
May 15, 2026 · Artificial Intelligence

Codex Gains Mobile Remote Control as Competition with Claude Code Heats Up

OpenAI's Codex now supports full‑screen mobile remote control via the ChatGPT app, letting developers monitor and approve tasks, switch models, and manage enterprise‑grade SSH environments from any device while maintaining a secure encrypted relay layer, sparking fierce rivalry with Claude Code.

AI agentsClaude CodeCodex
0 likes · 6 min read
Codex Gains Mobile Remote Control as Competition with Claude Code Heats Up
AI Waka
AI Waka
Mar 25, 2026 · Information Security

Why Enterprise AI Agents Pose Security Risks and How to Govern Them

The article examines the hidden governance gap of powerful enterprise AI agents, shares real‑world failures from the OpenClaw platform, and proposes a practical AAAA (Access, Authority, Audit, Abort) framework to safely deploy autonomous assistants in production environments.

AI agentsOpenClawaccess control
0 likes · 13 min read
Why Enterprise AI Agents Pose Security Risks and How to Govern Them
Frontend AI Walk
Frontend AI Walk
Mar 4, 2026 · Artificial Intelligence

Choosing Between Kimi Claw and Self‑Hosted OpenClaw: A Hybrid Strategy for Knowledge‑Intensive Teams

The article proposes a hybrid architecture where Kimi Claw serves as the primary knowledge and search hub while a self‑hosted OpenClaw node supplements it for intranet security and multi‑model experiments, detailing scenarios, data boundaries, step‑by‑step implementation, and model‑tool selection.

AI workflowClawHubKimi Claw
0 likes · 14 min read
Choosing Between Kimi Claw and Self‑Hosted OpenClaw: A Hybrid Strategy for Knowledge‑Intensive Teams
Alibaba Cloud Big Data AI Platform
Alibaba Cloud Big Data AI Platform
Sep 29, 2024 · Big Data

How MaxCompute Is Shaping the Next‑Gen Intelligent Cloud Data Warehouse

The 2024 Cloud Conference showcased Alibaba Cloud's MaxCompute, detailing its four‑pillar roadmap—Data+AI integration, Lakehouse 2.0, near‑real‑time analytics, and enterprise‑grade capabilities—while highlighting performance breakthroughs, security features, and a real‑world case study from Juewei Group.

MaxComputecloud data warehouseenterprise security
0 likes · 10 min read
How MaxCompute Is Shaping the Next‑Gen Intelligent Cloud Data Warehouse
Top Architect
Top Architect
Sep 6, 2023 · Information Security

Design and Implementation of Baidu's Unified Permission Management Service (MPS)

This article details the design and development of Baidu's Unified Permission Management Service (MPS), covering requirements analysis, technology selection, architecture, platform and node management, permission models (RBAC, ACL, DAC), functional modules, API integration, audit, and deployment strategies for enterprise-wide access control.

ACLDACRBAC
0 likes · 18 min read
Design and Implementation of Baidu's Unified Permission Management Service (MPS)
Baidu Geek Talk
Baidu Geek Talk
Aug 14, 2023 · Information Security

Design and Implementation of Unified Permission Management Service (MPS) at Baidu

Unified Permission Management Service (MPS) at Baidu centralizes fragmented permission systems across internal platforms, integrating ACL, DAC, and RBAC models via Baidu's GDP framework, and provides modules for platform and node management, permission CRUD, workflow approvals, and audit/recovery, now serving over 20,000 users and managing more than 100,000 permission nodes.

ACLBackend DevelopmentBaidu
0 likes · 16 min read
Design and Implementation of Unified Permission Management Service (MPS) at Baidu
Cloud Native Technology Community
Cloud Native Technology Community
Mar 21, 2023 · Information Security

2022 Cloud Native Security State Report: Key Findings on Cloud Expansion, Security Posture, and Drivers

The 2022 Cloud Native Security State Report reveals that while enterprises increased cloud usage by over 25% during the pandemic, many face security and compliance challenges, and highlights how strong security posture, DevSecOps integration, and automation dramatically reduce friction and boost operational efficiency.

Cloud NativeDevSecOpscloud adoption
0 likes · 6 min read
2022 Cloud Native Security State Report: Key Findings on Cloud Expansion, Security Posture, and Drivers
Zhongtong Tech
Zhongtong Tech
Nov 18, 2022 · Information Security

Data Security Insights from CIS 2022: Balancing Compliance and Business Growth

At the CIS 2022 Cybersecurity Innovation Conference in Shanghai, ZTO Express’s security chief shared practical strategies for data security governance, highlighting legal compliance, management vs. technical controls, and the emerging role of privacy computing in sustaining business operations.

Privacy Computingcompliancedata security
0 likes · 5 min read
Data Security Insights from CIS 2022: Balancing Compliance and Business Growth
Architects Research Society
Architects Research Society
Nov 3, 2022 · Operations

Potential Costs of Shadow IT for Enterprises

Unapproved software, known as shadow IT, can impose hidden personnel, business, and technical expenses on organizations, and CIOs must identify, prevent, and mitigate these costs to maintain smooth IT operations and avoid legal, security, and productivity risks.

Cost ManagementIT OperationsShadow IT
0 likes · 7 min read
Potential Costs of Shadow IT for Enterprises
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Aug 19, 2022 · Information Security

Huolala’s First Security Salon: Purple Team, Data Compliance & Platform Design

The online Huolala Security Salon on August 19 featured eight expert sessions covering enterprise security foundations, purple‑team tactics, security training programs, data‑security compliance practices, LLSRC award recognitions, game vulnerability analysis, the evolution of code‑audit techniques, and the design of a flexible security operations platform.

Security OperationsSecurity TrainingVulnerability Management
0 likes · 7 min read
Huolala’s First Security Salon: Purple Team, Data Compliance & Platform Design
Laravel Tech Community
Laravel Tech Community
Jun 29, 2022 · Information Security

Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT

This article describes the challenges of fragmented user management in enterprise applications and presents a unified, standardized account management solution based on token authentication, detailing OAuth2 password flow, JWT usage, system architecture, authorization processes, credential renewal, and interface design for secure, scalable access control.

JWTOAuth2access control
0 likes · 7 min read
Design and Implementation of a Unified Token-Based Authentication System Using OAuth2 and JWT
AntTech
AntTech
Jun 21, 2022 · Information Security

Zero Trust Security Model and Technical Architecture for Ant Financial Office

This article examines the evolution from traditional perimeter‑based security to zero‑trust models, compares their advantages, presents industry case studies, and details Ant Financial’s integrated zero‑trust architecture—including SDP, IAM, and micro‑segmentation—along with implementation practices and future outlook.

IAMMicro SegmentationSDP
0 likes · 17 min read
Zero Trust Security Model and Technical Architecture for Ant Financial Office
58 Tech
58 Tech
Apr 28, 2022 · Information Security

Design and Implementation of the “Magic Butler” Zero‑Trust Security Management System

The article presents a comprehensive case study of the Magic Butler system—a zero‑trust security management solution developed by 58 Group’s TEG department—detailing its business drivers, design principles, architecture, key technical features, deployment scale, and future outlook for enterprise network security.

Endpoint ManagementZero Trustaccess control
0 likes · 14 min read
Design and Implementation of the “Magic Butler” Zero‑Trust Security Management System
21CTO
21CTO
Mar 3, 2022 · Information Security

How Token‑Based OAuth2 Authentication Powers Secure Enterprise Platforms

This article explains why enterprises need a unified, token‑based OAuth2 authentication system, outlines its advantages over session‑based methods, describes the standard OAuth2 password flow, JWT usage, and details the authorization, authentication, and credential‑renewal processes with architectural diagrams.

JWTOAuth2enterprise security
0 likes · 10 min read
How Token‑Based OAuth2 Authentication Powers Secure Enterprise Platforms
21CTO
21CTO
Jul 28, 2021 · Information Security

How Google’s Open‑Source Tsunami Scanner Secures Massive Enterprise Networks

Google has open‑sourced a large‑scale vulnerability scanner called Tsunami, designed for enterprise networks with thousands of devices, featuring a two‑part architecture, extensible plugins, and a focus on accurate, high‑severity vulnerability detection to reduce false positives and alert fatigue.

GoogleTsunamienterprise security
0 likes · 5 min read
How Google’s Open‑Source Tsunami Scanner Secures Massive Enterprise Networks
Beike Product & Technology
Beike Product & Technology
Jul 20, 2021 · Information Security

Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies

This article shares practical experiences from building a zero‑to‑one information security management system for enterprises, outlining common security challenges, the role of such systems in risk governance, and detailed implementation approaches including security policies, penalty mechanisms, and management operations to achieve closed‑loop risk mitigation.

Security Governanceenterprise securityinformation security
0 likes · 10 min read
Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies
dbaplus Community
dbaplus Community
Jul 2, 2020 · Information Security

How 58 Daojia Secures Data in the DT Era: Threats, Practices, and Lessons

This article summarizes Liu Huan's presentation on data security in the DT era, covering the current security landscape, internal and external threats to enterprise data, and 58 Daojia's practical approaches to data discovery, classification, authentication, monitoring, and incident response.

DT eradata securityenterprise security
0 likes · 14 min read
How 58 Daojia Secures Data in the DT Era: Threats, Practices, and Lessons
Efficient Ops
Efficient Ops
Jun 25, 2020 · Information Security

How Enterprise DevSecOps Transforms Security in Modern IT Operations

The article recaps the fourth Enterprise DevOps Empowerment conference, highlighting DevSecOps as the core theme, expert presentations from China Academy of Information and Communications Technology, Huatai Securities, and Tencent, and a detailed Q&A covering threat modeling, security automation, scanning practices, and operational integration.

IT OperationsThreat Modelingenterprise security
0 likes · 15 min read
How Enterprise DevSecOps Transforms Security in Modern IT Operations
Youzan Coder
Youzan Coder
Dec 13, 2019 · Information Security

Boundary Defense in Enterprise Security: Definitions, Value, Techniques, and Youzan’s Implementation

Boundary defense—protective measures at business and IT entry points such as firewalls, WAFs, and secure development lifecycles—provides early‑stage enterprises a clear perimeter through detection, response, protection, and policy, as illustrated by Youzan’s web‑gate WAF, SDL checkpoints, DNS monitoring, and automated security‑ticket processes, enabling a shift toward deeper, defense‑in‑depth strategies.

SDLSecurityWAF
0 likes · 18 min read
Boundary Defense in Enterprise Security: Definitions, Value, Techniques, and Youzan’s Implementation
Architects' Tech Alliance
Architects' Tech Alliance
May 15, 2017 · Information Security

Ransomware Defense: Attack Vectors, C2 Communication, Defensive Chain, and Enterprise Security Gaps

This article provides an in‑depth analysis of ransomware, detailing its typical propagation methods, common intrusion techniques, C2 communication behaviors, the defensive chain across reconnaissance, deployment and persistence stages, and highlights current enterprise security gaps and comprehensive protection strategies.

C2 communicationThreat Defenseenterprise security
0 likes · 13 min read
Ransomware Defense: Attack Vectors, C2 Communication, Defensive Chain, and Enterprise Security Gaps