Tag

security operations

0 views collected around this technical thread.

AntTech
AntTech
Jun 6, 2025 · Information Security

How Ant Group’s Aspect‑Fusion AI Boosts Threat Detection and Reduces False Alarms

Ant Group’s “Aspect‑Fusion Intelligence” system, recognized as an outstanding cybersecurity case at the 2025 Beijing Cybersecurity Conference, leverages large‑model AI and expert knowledge to enhance threat detection, lower false positives, and improve explainability in large‑scale intrusion detection.

AIAnt Groupcase study
0 likes · 4 min read
How Ant Group’s Aspect‑Fusion AI Boosts Threat Detection and Reduces False Alarms
DataFunSummit
DataFunSummit
Nov 26, 2024 · Information Security

AI‑Driven Security Operations (AISECOPS): Architecture, Practices, and Evaluation

This article explains how large‑model AI can be integrated into security operations (AISECOPS) to simplify application integration, improve fault detection, and automate protection across complex north‑south and east‑west network layers, while addressing challenges such as data quality, cost control, model selection, and safety frameworks.

AISECOPSCost OptimizationLarge Models
0 likes · 22 min read
AI‑Driven Security Operations (AISECOPS): Architecture, Practices, and Evaluation
DataFunTalk
DataFunTalk
Aug 11, 2024 · Artificial Intelligence

AI‑Driven Security Operations (AISECOPS): Architecture, Practices, and Evaluation

This article presents a comprehensive overview of AI‑enabled security operations, detailing the industry pain points, the AISECOPS workflow, model selection between OpenAI embeddings and ST5, classification methods, performance and cost evaluations, and future directions for integrating agents and secure AI pipelines.

AIAnomaly DetectionCost Evaluation
0 likes · 22 min read
AI‑Driven Security Operations (AISECOPS): Architecture, Practices, and Evaluation
JD Tech Talk
JD Tech Talk
Jul 5, 2024 · Information Security

Analysis of CVE-2024-6387 OpenSSH Server Remote Code Execution Vulnerability and Enterprise Emergency Response Practices

The article examines the critical CVE-2024-6387 OpenSSH 0‑day remote code execution flaw, explains its technical details, and outlines JD Cloud's comprehensive emergency response, attack‑surface management, precise vulnerability intelligence, and managed security services to help enterprises mitigate such threats.

0dayCVE-2024-6387Cloud Security
0 likes · 11 min read
Analysis of CVE-2024-6387 OpenSSH Server Remote Code Execution Vulnerability and Enterprise Emergency Response Practices
Efficient Ops
Efficient Ops
Nov 30, 2023 · Information Security

How Attack Simulation (BAS) Boosts Security Operations – Insights from GOPS 2023

The 21st GOPS Global Operations Conference in Shanghai featured a Tencent Security expert who explained how attack simulation (BAS) provides continuous security control testing, risk assessment for high‑value assets, and a structured workflow that enhances security maturity and investment decisions.

Attack SimulationBASGOPS 2023
0 likes · 3 min read
How Attack Simulation (BAS) Boosts Security Operations – Insights from GOPS 2023
Dada Group Technology
Dada Group Technology
Jun 20, 2022 · Information Security

Design and Implementation of JD Daojia Security Operations Center (SOC) Platform

This article details the challenges, design choices, deployment steps, detection model creation, data processing, visualization, and future plans of JD Daojia's security operations platform, highlighting the use of Graylog, Elasticsearch, and MongoDB to achieve scalable, real‑time threat detection and response.

Data VisualizationGraylogLog Analysis
0 likes · 16 min read
Design and Implementation of JD Daojia Security Operations Center (SOC) Platform
Qunar Tech Salon
Qunar Tech Salon
Jun 4, 2021 · Information Security

Automated Risk Monitoring and Upgrade of Jar Components at Qunar

This article describes Qunar's end‑to‑end automated workflow for detecting high‑risk Jar component vulnerabilities, collecting asset information, orchestrating remediation with a SOAR platform, and leveraging the TCDEV auto‑upgrade service to reduce manual effort and improve security operations efficiency.

JarSOARTCDEV
0 likes · 8 min read
Automated Risk Monitoring and Upgrade of Jar Components at Qunar
iQIYI Technical Product Team
iQIYI Technical Product Team
Jan 8, 2021 · Information Security

SOAR (Security Orchestration, Automation and Response) Implementation at iQIYI: Architecture, Scenarios, and Roadmap

iQIYI’s SOAR platform, built on StackStorm and the Walkoff visual editor, integrates security components, scripts, chat‑ops bots, and a mini‑program to automate detection and response, cutting MTTR by roughly 75% across high‑frequency routine tasks and low‑frequency critical incidents while planning broader coverage and knowledge‑base expansion.

SOARSecurity AutomationStackStorm
0 likes · 8 min read
SOAR (Security Orchestration, Automation and Response) Implementation at iQIYI: Architecture, Scenarios, and Roadmap
Efficient Ops
Efficient Ops
Apr 19, 2017 · Information Security

From Zero to Secure: How Zhaogang Built Its Information Security Operations

This article details Zhaogang's journey from a chaotic startup environment to a mature, multi‑stage security operation, covering its background, the four‑phase security framework, traditional security domains, and practical strategies for driving security initiatives across the organization.

B2Binformation securityinfrastructure
0 likes · 17 min read
From Zero to Secure: How Zhaogang Built Its Information Security Operations
Efficient Ops
Efficient Ops
Apr 13, 2017 · Information Security

From Traditional Ops to Automated Security: Ctrip’s Journey and Lessons

This article recounts a Ctrip security engineer’s evolution from early Unix‑based operations to fully automated network security, highlighting challenges in forecasting, application security integration, rapid incident response, and large‑scale firewall automation within a fast‑growing enterprise.

DevOpsNetwork Securityautomation
0 likes · 12 min read
From Traditional Ops to Automated Security: Ctrip’s Journey and Lessons
Efficient Ops
Efficient Ops
Feb 20, 2017 · Information Security

Inside YY's Security Ops: Real-World Incident Stories and Architecture

This article shares YY's security operations journey, detailing real incident response scenarios, the evolution of their security infrastructure from 2012 onward, and the key factors considered when building a robust security ops system, including DDoS protection, WAF, vulnerability scanning, intrusion detection, and data‑driven automation.

DDoS protectionbig data analyticsincident response
0 likes · 24 min read
Inside YY's Security Ops: Real-World Incident Stories and Architecture
Efficient Ops
Efficient Ops
Mar 8, 2016 · Information Security

How to Build an Effective Information Security Response Plan Before a Breach

This article outlines why proactive information‑security preparedness, cross‑department response teams, and clear incident‑response checklists are essential for minimizing damage and maintaining trust when a data breach occurs.

data breachincident responseinformation security
0 likes · 14 min read
How to Build an Effective Information Security Response Plan Before a Breach
Architect
Architect
Jan 19, 2016 · Information Security

100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook

The article presents a comprehensive list of one hundred concrete web‑application security techniques—ranging from HTTP request analysis and token validation to WAF rule conversion, honeypot deployment, IP reputation checks, and response‑time monitoring—derived from the book “Web Application Defender's Cookbook” and illustrated with real‑world examples and tool references.

Defense TechniquesModSecurityWeb Security
0 likes · 16 min read
100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook