Tagged articles
7 articles
Page 1 of 1
AI Step-by-Step
AI Step-by-Step
Apr 11, 2026 · Information Security

Beyond Prompt Guardrails: Full‑Stack Security Governance for AI Agents

The article explains how production‑grade AI agents require a full‑stack security framework—covering input sanitization, runtime policy enforcement, output verification, and audit—to mitigate ten OWASP attack surfaces such as prompt injection, tool misuse, memory poisoning, and cascading failures, with practical defense layers and red‑team testing guidance.

AI agentsLeast AgencyMemory Poisoning
0 likes · 14 min read
Beyond Prompt Guardrails: Full‑Stack Security Governance for AI Agents
Data Thinking Notes
Data Thinking Notes
Jun 12, 2024 · Information Security

How to Implement Data Classification and Grading for Robust Security

This article outlines the national‑standard‑based methodology for classifying and grading data, detailing industry‑specific processes, core and important data identification criteria, general data handling, and a privacy‑focused governance framework that enables organizations to protect sensitive information effectively.

Data ProtectionSecurity Governancedata classification
0 likes · 13 min read
How to Implement Data Classification and Grading for Robust Security
Architects Research Society
Architects Research Society
Jun 10, 2023 · Information Security

Roles and Responsibilities of a Security Architecture Team

The article outlines the composition of a security architecture team, detailing the roles of security architect, information security architect, chief information security officer, and security analyst, along with their business and technical skills, organizational relationships, and key responsibilities in managing enterprise security.

CISOSecurity AnalystSecurity Architecture
0 likes · 13 min read
Roles and Responsibilities of a Security Architecture Team
Beike Product & Technology
Beike Product & Technology
Jul 20, 2021 · Information Security

Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies

This article shares practical experiences from building a zero‑to‑one information security management system for enterprises, outlining common security challenges, the role of such systems in risk governance, and detailed implementation approaches including security policies, penalty mechanisms, and management operations to achieve closed‑loop risk mitigation.

Security Governanceenterprise securityinformation security
0 likes · 10 min read
Building an Enterprise Information Security Management System: Challenges, Role, and Implementation Strategies
Efficient Ops
Efficient Ops
Jan 24, 2019 · Information Security

How Alibaba Scales Host Security Across Its Global Economic Ecosystem

This talk outlines Alibaba’s massive global host infrastructure, the evolving security governance from manual controls to data‑driven, automated systems, the challenges of compliance and operational efficiency, and future directions such as zero‑trust and invisible security.

Host SecurityOperationsSecurity Governance
0 likes · 16 min read
How Alibaba Scales Host Security Across Its Global Economic Ecosystem