Tagged articles
26 articles
Page 1 of 1
360 Tech Engineering
360 Tech Engineering
Jul 29, 2025 · Information Security

How AI and Big Data Are Redefining Global Cybersecurity – Insights from Zhou Hongyi

In his 2025 World Internet Conference Digital Silk Road Forum keynote, Zhou Hongyi warned that the programmable, AI‑driven, data‑centric world amplifies cyber vulnerabilities, described the rise of state‑level cyber warfare and AI‑powered attacks, and outlined 360’s security‑as‑service strategy and global cooperation plans to protect nations and enterprises.

AIBig DataSecurity Operations
0 likes · 5 min read
How AI and Big Data Are Redefining Global Cybersecurity – Insights from Zhou Hongyi
360 Tech Engineering
360 Tech Engineering
Jul 4, 2025 · Artificial Intelligence

How AI is Revolutionizing Security Operations: Insights from the 2025 Global Digital Economy Conference

The 2025 Global Digital Economy Conference highlighted the fusion of big data and AI in security, revealing both the transformative potential of large‑model technologies for operational efficiency and the critical challenges they pose, while showcasing 360's AI‑native platform and measurable performance gains.

AI securityBig DataDigital Transformation
0 likes · 5 min read
How AI is Revolutionizing Security Operations: Insights from the 2025 Global Digital Economy Conference
Zuoyebang Tech Team
Zuoyebang Tech Team
Jun 12, 2025 · Information Security

How AI‑Powered RAG and Agents Are Revolutionizing Enterprise Security Operations

This article explains how the rise of AI large‑model technology and Retrieval‑Augmented Generation (RAG) combined with autonomous AI agents enable a three‑layer network‑boundary defense, address deep operational challenges such as alert overload and response latency, and dramatically improve incident‑response efficiency in large‑scale enterprises.

AI agentsAI securityRAG
0 likes · 16 min read
How AI‑Powered RAG and Agents Are Revolutionizing Enterprise Security Operations
AntTech
AntTech
Jun 6, 2025 · Information Security

How Ant Group’s Aspect‑Fusion AI Boosts Threat Detection and Reduces False Alarms

Ant Group’s “Aspect‑Fusion Intelligence” system, recognized as an outstanding cybersecurity case at the 2025 Beijing Cybersecurity Conference, leverages large‑model AI and expert knowledge to enhance threat detection, lower false positives, and improve explainability in large‑scale intrusion detection.

AIAnt GroupCase Study
0 likes · 4 min read
How Ant Group’s Aspect‑Fusion AI Boosts Threat Detection and Reduces False Alarms
DataFunSummit
DataFunSummit
Nov 26, 2024 · Information Security

AI‑Driven Security Operations (AISECOPS): Architecture, Practices, and Evaluation

This article explains how large‑model AI can be integrated into security operations (AISECOPS) to simplify application integration, improve fault detection, and automate protection across complex north‑south and east‑west network layers, while addressing challenges such as data quality, cost control, model selection, and safety frameworks.

AISECOPSCost OptimizationEmbedding
0 likes · 22 min read
AI‑Driven Security Operations (AISECOPS): Architecture, Practices, and Evaluation
DataFunTalk
DataFunTalk
Aug 11, 2024 · Artificial Intelligence

AI‑Driven Security Operations (AISECOPS): Architecture, Practices, and Evaluation

This article presents a comprehensive overview of AI‑enabled security operations, detailing the industry pain points, the AISECOPS workflow, model selection between OpenAI embeddings and ST5, classification methods, performance and cost evaluations, and future directions for integrating agents and secure AI pipelines.

AICost EvaluationOps Automation
0 likes · 22 min read
AI‑Driven Security Operations (AISECOPS): Architecture, Practices, and Evaluation
JD Tech Talk
JD Tech Talk
Jul 5, 2024 · Information Security

Analysis of CVE-2024-6387 OpenSSH Server Remote Code Execution Vulnerability and Enterprise Emergency Response Practices

The article examines the critical CVE-2024-6387 OpenSSH 0‑day remote code execution flaw, explains its technical details, and outlines JD Cloud's comprehensive emergency response, attack‑surface management, precise vulnerability intelligence, and managed security services to help enterprises mitigate such threats.

0dayCVE-2024-6387OpenSSH
0 likes · 11 min read
Analysis of CVE-2024-6387 OpenSSH Server Remote Code Execution Vulnerability and Enterprise Emergency Response Practices
Huolala Tech
Huolala Tech
May 21, 2024 · Information Security

How Huolala Built a Comprehensive Security Asset Map for Cloud‑Native Environments

Huolala’s Information Security team built a comprehensive security asset library and visualization framework, detailing asset pain points, mapping methodology, detection and drawing modules, and measurable outcomes, to enhance asset visibility, risk assessment, and continuous security operations in a cloud‑native environment.

Cloud NativeSecurity Operationsasset mapping
0 likes · 12 min read
How Huolala Built a Comprehensive Security Asset Map for Cloud‑Native Environments
Huolala Tech
Huolala Tech
Jan 16, 2024 · Information Security

How Graph Databases Revolutionize Host Security Incident Response

This article explores how HuoLala's host security HIDS leverages Neo4j graph databases and the Neovis.js visualization library to unify process, network, and file data, enabling rapid attack‑chain reconstruction, efficient multi‑cloud incident response, and improved security operations.

CypherHost SecurityNeo4j
0 likes · 16 min read
How Graph Databases Revolutionize Host Security Incident Response
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Aug 19, 2022 · Information Security

Huolala’s First Security Salon: Purple Team, Data Compliance & Platform Design

The online Huolala Security Salon on August 19 featured eight expert sessions covering enterprise security foundations, purple‑team tactics, security training programs, data‑security compliance practices, LLSRC award recognitions, game vulnerability analysis, the evolution of code‑audit techniques, and the design of a flexible security operations platform.

Security OperationsSecurity TrainingVulnerability Management
0 likes · 7 min read
Huolala’s First Security Salon: Purple Team, Data Compliance & Platform Design
dbaplus Community
dbaplus Community
Jul 2, 2022 · Information Security

How Top Banks Deploy DevSecOps to Strengthen Enterprise Security – Insights from a 2022 GDevOps Summit

The article summarizes Wei Yadong’s 2022 GDevOps Global Agile Operations Summit talk, covering the escalating threat landscape, financial industry security requirements, practical DevSecOps strategies, ICBC’s security transformation, and future trends such as security mesh, privacy‑enhancing computation, and decision intelligence.

DevSecOpsFinancial ServicesSecurity Operations
0 likes · 23 min read
How Top Banks Deploy DevSecOps to Strengthen Enterprise Security – Insights from a 2022 GDevOps Summit
Dada Group Technology
Dada Group Technology
Jun 20, 2022 · Information Security

Design and Implementation of JD Daojia Security Operations Center (SOC) Platform

This article details the challenges, design choices, deployment steps, detection model creation, data processing, visualization, and future plans of JD Daojia's security operations platform, highlighting the use of Graylog, Elasticsearch, and MongoDB to achieve scalable, real‑time threat detection and response.

Data visualizationGraylogSOC
0 likes · 16 min read
Design and Implementation of JD Daojia Security Operations Center (SOC) Platform
Open Source Linux
Open Source Linux
Jan 17, 2022 · Information Security

Mastering Incident Response: A Step‑by‑Step Guide for Security Professionals

This comprehensive guide walks security engineers through every phase of an incident response—from initial information gathering, containment, and vulnerability scanning to detailed log, process, and account analysis, culminating in recovery steps and post‑incident hardening recommendations.

ForensicsSecurity OperationsSystem Hardening
0 likes · 28 min read
Mastering Incident Response: A Step‑by‑Step Guide for Security Professionals
Qunar Tech Salon
Qunar Tech Salon
Jun 4, 2021 · Information Security

Automated Risk Monitoring and Upgrade of Jar Components at Qunar

This article describes Qunar's end‑to‑end automated workflow for detecting high‑risk Jar component vulnerabilities, collecting asset information, orchestrating remediation with a SOAR platform, and leveraging the TCDEV auto‑upgrade service to reduce manual effort and improve security operations efficiency.

AutomationJARSOAR
0 likes · 8 min read
Automated Risk Monitoring and Upgrade of Jar Components at Qunar
iQIYI Technical Product Team
iQIYI Technical Product Team
Jan 8, 2021 · Information Security

SOAR (Security Orchestration, Automation and Response) Implementation at iQIYI: Architecture, Scenarios, and Roadmap

iQIYI’s SOAR platform, built on StackStorm and the Walkoff visual editor, integrates security components, scripts, chat‑ops bots, and a mini‑program to automate detection and response, cutting MTTR by roughly 75% across high‑frequency routine tasks and low‑frequency critical incidents while planning broader coverage and knowledge‑base expansion.

SOARSecurity OperationsStackStorm
0 likes · 8 min read
SOAR (Security Orchestration, Automation and Response) Implementation at iQIYI: Architecture, Scenarios, and Roadmap
JD Cloud Developers
JD Cloud Developers
Nov 13, 2020 · Information Security

How to Secure Major Events: Offensive & Defensive Strategies Revealed

This article presents the complete PPT from Zhu Yanyong’s CSDN live session, detailing offensive and defensive practices for ensuring network security during large‑scale events, covering threat modeling, DDoS mitigation, WAF deployment, incident response, and post‑event analysis.

CSDNSecurity Operationsmajor events
0 likes · 3 min read
How to Secure Major Events: Offensive & Defensive Strategies Revealed
Tencent Cloud Developer
Tencent Cloud Developer
Jul 1, 2019 · Information Security

How to Detect and Prevent Cloud Data Leaks: Practical Strategies and Rule Configurations

This guide explains recent cloud‑based data‑leak incidents, categorizes common leak vectors, analyzes technical and managerial root causes, and provides actionable monitoring techniques, rule‑configuration examples, and incident‑response steps using Tencent Cloud Security Operations Center.

GitHubSecurity OperationsTencent Cloud
0 likes · 19 min read
How to Detect and Prevent Cloud Data Leaks: Practical Strategies and Rule Configurations
Meituan Technology Team
Meituan Technology Team
Nov 8, 2018 · Information Security

Intrusion Detection: Concepts, Challenges, and Best Practices

Effective intrusion detection for large enterprises hinges on combining signature‑based pattern matching with baseline anomaly modeling, gathering comprehensive host and network logs, focusing on the GetShell foothold, managing alert fatigue, and integrating AI‑enhanced feature engineering while maintaining robust operational foundations and continuous expertise development.

AISecurity Operationscybersecurity
0 likes · 31 min read
Intrusion Detection: Concepts, Challenges, and Best Practices
Meituan Technology Team
Meituan Technology Team
Oct 26, 2017 · Information Security

External Network Port Monitoring: Evolution, Methods, and Best Practices

The article chronicles Meituan‑Dianping’s external network port monitoring evolution—from slow Python‑driven Nmap scans to a fast Masscan‑Nmap pipeline and real‑time traffic‑driven DPDK module—explaining black‑box scanning, white‑box analysis, best‑practice recommendations, and the critical role of continuous port visibility for security.

Security OperationsTCP SYNmasscan
0 likes · 13 min read
External Network Port Monitoring: Evolution, Methods, and Best Practices
Efficient Ops
Efficient Ops
Apr 19, 2017 · Information Security

From Zero to Secure: How Zhaogang Built Its Information Security Operations

This article details Zhaogang's journey from a chaotic startup environment to a mature, multi‑stage security operation, covering its background, the four‑phase security framework, traditional security domains, and practical strategies for driving security initiatives across the organization.

B2BSecurity Operationsinformation security
0 likes · 17 min read
From Zero to Secure: How Zhaogang Built Its Information Security Operations
Efficient Ops
Efficient Ops
Apr 13, 2017 · Information Security

From Traditional Ops to Automated Security: Ctrip’s Journey and Lessons

This article recounts a Ctrip security engineer’s evolution from early Unix‑based operations to fully automated network security, highlighting challenges in forecasting, application security integration, rapid incident response, and large‑scale firewall automation within a fast‑growing enterprise.

AutomationSecurity Operationsincident response
0 likes · 12 min read
From Traditional Ops to Automated Security: Ctrip’s Journey and Lessons
Efficient Ops
Efficient Ops
Feb 20, 2017 · Information Security

Inside YY's Security Ops: Real-World Incident Stories and Architecture

This article shares YY's security operations journey, detailing real incident response scenarios, the evolution of their security infrastructure from 2012 onward, and the key factors considered when building a robust security ops system, including DDoS protection, WAF, vulnerability scanning, intrusion detection, and data‑driven automation.

DDoS protectionSecurity Operationsbig data analytics
0 likes · 24 min read
Inside YY's Security Ops: Real-World Incident Stories and Architecture
Architect
Architect
Jan 19, 2016 · Information Security

100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook

The article presents a comprehensive list of one hundred concrete web‑application security techniques—ranging from HTTP request analysis and token validation to WAF rule conversion, honeypot deployment, IP reputation checks, and response‑time monitoring—derived from the book “Web Application Defender's Cookbook” and illustrated with real‑world examples and tool references.

ModSecuritySecurity OperationsThreat Detection
0 likes · 16 min read
100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook