Tag

Security Automation

1 views collected around this technical thread.

Efficient Ops
Efficient Ops
Jan 8, 2024 · Information Security

How a Securities Firm Built a 100‑Day DevSecOps Prototype

At the 21st GOPS Global Operations Conference in Shanghai, Shenwan Hongyuan Securities' application security lead Wang Biansi detailed a step‑by‑step 100‑day journey to create a DevSecOps sample room, covering goal setting, research, platform design, tool integration, and security training.

DevSecOpsSecurity Automationapplication security
0 likes · 5 min read
How a Securities Firm Built a 100‑Day DevSecOps Prototype
Efficient Ops
Efficient Ops
Jun 24, 2023 · Information Security

How ICBC Built a DevSecOps Security Framework to Accelerate Safe Software Delivery

This article explains how ICBC's software development center integrated DevSecOps practices—embedding security awareness, automating toolchains, and using metric‑driven assessments—to reduce vulnerabilities, lower compliance risk, and support a cloud‑native, secure smart‑banking ecosystem.

Cloud NativeDevSecOpsSecurity Automation
0 likes · 8 min read
How ICBC Built a DevSecOps Security Framework to Accelerate Safe Software Delivery
Cloud Native Technology Community
Cloud Native Technology Community
Mar 21, 2023 · Information Security

2022 Cloud Native Security State Report: Key Findings on Cloud Expansion, Security Posture, and Drivers

The 2022 Cloud Native Security State Report reveals that while enterprises increased cloud usage by over 25% during the pandemic, many face security and compliance challenges, and highlights how strong security posture, DevSecOps integration, and automation dramatically reduce friction and boost operational efficiency.

Cloud AdoptionCloud NativeDevSecOps
0 likes · 6 min read
2022 Cloud Native Security State Report: Key Findings on Cloud Expansion, Security Posture, and Drivers
AntTech
AntTech
Nov 28, 2022 · Information Security

Ant Group Anti‑Intrusion Platform: Architecture, Trillion‑Scale Detection, Risk Assessment, and Automated Response

This article details the evolution, architecture, and key technologies of Ant Group's anti‑intrusion platform, explaining how it handles trillion‑level data streams for intrusion detection, performs multi‑dimensional risk assessment and attribution, and enables rapid, automated security incident response across massive enterprise environments.

Intrusion DetectionSecurity Automationanti-intrusion
0 likes · 15 min read
Ant Group Anti‑Intrusion Platform: Architecture, Trillion‑Scale Detection, Risk Assessment, and Automated Response
Dada Group Technology
Dada Group Technology
Nov 28, 2022 · Information Security

Analyzing Java Template Engine Injection Vulnerabilities and Building Automated Detection Capabilities

This article examines injection vulnerabilities in Java template engines Velocity, FreeMarker, and Thymeleaf, details payload extraction, demonstrates how to generate automated detection rules and security operation capabilities, and discusses future directions for comprehensive attack‑chain analysis.

JavaSecurity AutomationThymeleaf
0 likes · 12 min read
Analyzing Java Template Engine Injection Vulnerabilities and Building Automated Detection Capabilities
DevOps Cloud Academy
DevOps Cloud Academy
Jul 21, 2022 · Information Security

Insights on DevSecOps and Code‑Vaccine Technology from XMirror Security Founder

In a detailed interview, XMirror Security founder Zi‑Ya discusses the origins of his team, the core elements of DevSecOps, the innovative code‑vaccine technology combining IAST and RASP, maturity stages of development security in China, and future trends in software‑supply‑chain security.

Code VaccineDevSecOpsIAST
0 likes · 10 min read
Insights on DevSecOps and Code‑Vaccine Technology from XMirror Security Founder
iQIYI Technical Product Team
iQIYI Technical Product Team
Jan 8, 2021 · Information Security

SOAR (Security Orchestration, Automation and Response) Implementation at iQIYI: Architecture, Scenarios, and Roadmap

iQIYI’s SOAR platform, built on StackStorm and the Walkoff visual editor, integrates security components, scripts, chat‑ops bots, and a mini‑program to automate detection and response, cutting MTTR by roughly 75% across high‑frequency routine tasks and low‑frequency critical incidents while planning broader coverage and knowledge‑base expansion.

SOARSecurity AutomationStackStorm
0 likes · 8 min read
SOAR (Security Orchestration, Automation and Response) Implementation at iQIYI: Architecture, Scenarios, and Roadmap
DevOps
DevOps
Sep 7, 2020 · Information Security

OPPO’s DevSecOps Practice: Embedding Security and Privacy Across the Development Lifecycle

OPPO’s security team outlines its DevSecOps transformation, detailing how security and privacy activities are embedded across product lifecycles—from requirement reviews and automated CI/CD scans to comprehensive protection layers, cultural initiatives, external collaborations, and continuous improvement to meet global compliance challenges.

DevSecOpsOPPOSecurity Automation
0 likes · 12 min read
OPPO’s DevSecOps Practice: Embedding Security and Privacy Across the Development Lifecycle
Efficient Ops
Efficient Ops
Jun 25, 2020 · Information Security

How Enterprise DevSecOps Transforms Security in Modern IT Operations

The article recaps the fourth Enterprise DevOps Empowerment conference, highlighting DevSecOps as the core theme, expert presentations from China Academy of Information and Communications Technology, Huatai Securities, and Tencent, and a detailed Q&A covering threat modeling, security automation, scanning practices, and operational integration.

DevSecOpsEnterprise SecurityIT Operations
0 likes · 15 min read
How Enterprise DevSecOps Transforms Security in Modern IT Operations
DevOps
DevOps
Apr 21, 2020 · Information Security

Integrating SAST Tools into a DevSecOps Pipeline: Five Key Checkpoints and Best Practices

This article explains how to embed static application security testing (SAST) into a DevSecOps CI/CD pipeline by defining five essential checkpoints—pre‑commit, commit‑time, build‑time, test‑time, and deployment—covering purpose, benefits, handling false positives, result merging, custom rule sets, and automation strategies.

DevSecOpsSASTSecurity Automation
0 likes · 20 min read
Integrating SAST Tools into a DevSecOps Pipeline: Five Key Checkpoints and Best Practices