Tag

privacy compliance

0 views collected around this technical thread.

DataFunSummit
DataFunSummit
Jan 5, 2023 · Information Security

ByteDance Big Data Platform Security and Permission Governance Practices

This article outlines ByteDance's comprehensive big‑data security framework, detailing current challenges, fine‑grained permission control, asset protection, data deletion capabilities, and the governance principles that balance compliance with operational efficiency.

Access ControlBig DataData Security
0 likes · 13 min read
ByteDance Big Data Platform Security and Permission Governance Practices
AntTech
AntTech
Aug 11, 2022 · Information Security

Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends

The article outlines Ant Financial’s evolving mobile endpoint security strategy, detailing three development stages, the challenges of balancing security with user experience, risk pre‑emptive control, and privacy compliance, and introduces the AntDTX trusted middleware that integrates hardware and software for cloud‑edge collaborative risk mitigation.

Cloud-Edge CollaborationMobile SecurityTrusted Computing
0 likes · 15 min read
Ant Financial's End‑to‑End Mobile Security Architecture and Future Trends
AntTech
AntTech
Jul 8, 2022 · Information Security

Ant Group mPaaS Full‑Chain Mobile Security Solution: Overview and Practical Insights

This article reviews Ant Group's award‑winning mPaaS mobile security solution, detailing the current mobile app security landscape, regulatory pressures, and the four‑layer full‑chain protection architecture—including data security, privacy control, biometric authentication, and app hardening—along with practical compliance and risk‑mitigation practices.

Ant GroupMobile Securityapplication security
0 likes · 8 min read
Ant Group mPaaS Full‑Chain Mobile Security Solution: Overview and Practical Insights
DevOps
DevOps
Sep 7, 2020 · Information Security

OPPO’s DevSecOps Practice: Embedding Security and Privacy Across the Development Lifecycle

OPPO’s security team outlines its DevSecOps transformation, detailing how security and privacy activities are embedded across product lifecycles—from requirement reviews and automated CI/CD scans to comprehensive protection layers, cultural initiatives, external collaborations, and continuous improvement to meet global compliance challenges.

DevSecOpsOPPOSecurity Automation
0 likes · 12 min read
OPPO’s DevSecOps Practice: Embedding Security and Privacy Across the Development Lifecycle