Tagged articles
63 articles
Page 1 of 1
SuanNi
SuanNi
Apr 30, 2026 · Information Security

Agent Skills Security: Full Lifecycle Governance Framework and Threat Landscape

The article presents a comprehensive security analysis of AI Agent Skills, outlining a four‑stage attack surface—from creation to execution—detailing core risks such as malicious logic injection, supply‑chain poisoning, and persistent trust abuse, and proposes a full‑lifecycle governance framework, OWASP‑style top‑10, and emerging mitigation tools.

Agent SkillsSecurityThreat Modeling
0 likes · 17 min read
Agent Skills Security: Full Lifecycle Governance Framework and Threat Landscape
Black & White Path
Black & White Path
Apr 24, 2026 · Information Security

Why Forgotten Ghost APIs Are Becoming Attackers’ Golden Backdoors

Ghost APIs—deprecated endpoints that remain active in production—create invisible attack surfaces, allowing adversaries to bypass modern defenses, as illustrated by incidents like Optus and T‑Mobile; the article dissects their risks, how attackers locate them, and practical three‑step defenses to eliminate these hidden vulnerabilities.

AI threatAPI SecurityDeprecated endpoints
0 likes · 15 min read
Why Forgotten Ghost APIs Are Becoming Attackers’ Golden Backdoors
Black & White Path
Black & White Path
Mar 27, 2026 · Information Security

When Deepfakes Cost $25 Million: The End of Video‑Call Authentication

A 2025‑2026 deep‑fake attack on Arup’s finance team used publicly gathered intelligence to create a real‑time, AI‑generated video of the CFO and colleagues, resulting in a $25 million transfer and exposing the economic asymmetry that makes video‑call authentication unreliable, prompting a shift to multi‑channel, zero‑trust verification.

Identity verificationSecurityZero Trust
0 likes · 28 min read
When Deepfakes Cost $25 Million: The End of Video‑Call Authentication
Black & White Path
Black & White Path
Mar 12, 2026 · Information Security

When 1 Billion IDs Leak: Inside the Biggest Identity Verification Breach Ever

A leading identity verification provider exposed over one billion personal records after a cloud storage bucket was misconfigured, revealing names, IDs, biometric data and more; the breach impacted finance, e‑commerce, government and social platforms, prompting analysis of technical and managerial failures and a set of remediation steps for individuals, enterprises and the industry.

KYC securityZero Trustcloud misconfiguration
0 likes · 10 min read
When 1 Billion IDs Leak: Inside the Biggest Identity Verification Breach Ever
Old Zhang's AI Learning
Old Zhang's AI Learning
Feb 1, 2026 · Cloud Native

Run Clawdbot Without a Mac Mini Using Cloudflare’s Open‑Source Moltworker

Moltworker, Cloudflare’s open‑source middleware, lets you host the openclaw (Clawdbot) AI assistant on the edge for just $5 a month, offering multi‑platform chat support, persistent storage, browser automation, and secure Zero Trust access, while outlining its simple deployment steps, strengths, and limitations.

AI AgentCloudflare WorkersEdge Computing
0 likes · 7 min read
Run Clawdbot Without a Mac Mini Using Cloudflare’s Open‑Source Moltworker
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jan 15, 2026 · Cloud Native

Deploy Alibaba Cloud Service Mesh (ASM): Gateways, Traffic Management & Zero‑Trust

This guide explains how to set up Alibaba Cloud Service Mesh (ASM) on an ACK Kubernetes cluster, covering prerequisites, two methods of cluster registration, creation of north‑south and east‑west gateways, traffic routing with HTTPRoute, security policies using PeerAuthentication and AuthorizationPolicy, and observability configuration via Telemetry.

ASMAlibaba CloudGateway API
0 likes · 9 min read
Deploy Alibaba Cloud Service Mesh (ASM): Gateways, Traffic Management & Zero‑Trust
DevOps Coach
DevOps Coach
Jan 8, 2026 · Information Security

Why VPNs Are Obsolete: 12 Top Zero‑Trust Tools to Secure Your Network

This article explains why traditional VPNs are increasingly insecure, outlines the core principles of zero‑trust security, reviews twelve leading zero‑trust solutions with features, real‑world red‑team examples and quick‑setup commands, and provides a step‑by‑step migration guide from VPN to zero‑trust.

Red TeamVPN replacementZero Trust
0 likes · 21 min read
Why VPNs Are Obsolete: 12 Top Zero‑Trust Tools to Secure Your Network
IT Architects Alliance
IT Architects Alliance
Dec 10, 2025 · Information Security

How to Build a Zero Trust Security Architecture: Principles, Code Samples, and Step‑by‑Step Guide

This article explains why traditional perimeter security fails in modern distributed environments and presents a comprehensive zero‑trust model, covering core design principles, technical implementation layers, practical YAML and Python examples, phased rollout strategies, technology choices, common challenges, and future trends.

IAMNetwork PolicyZero Trust
0 likes · 10 min read
How to Build a Zero Trust Security Architecture: Principles, Code Samples, and Step‑by‑Step Guide
MaGe Linux Operations
MaGe Linux Operations
Oct 22, 2025 · Information Security

Build a Zero‑Trust Container Security Pipeline in 10 Practical Steps

This guide walks you through a ten‑step zero‑trust framework for hardening container security—from supply‑chain image signing and SBOM generation to runtime threat detection, network policies, secret encryption, and continuous monitoring—targeted at production Kubernetes clusters of any scale.

Container SecurityImage SigningZero Trust
0 likes · 31 min read
Build a Zero‑Trust Container Security Pipeline in 10 Practical Steps
MaGe Linux Operations
MaGe Linux Operations
Oct 18, 2025 · Information Security

Master Container Security: Complete Guide to Image Scanning and Zero‑Trust Runtime Protection

This comprehensive guide walks you through securing container workloads by defining applicable scenarios, setting up prerequisites, installing Trivy and Falco, hardening Dockerfiles, integrating CI/CD scanning and signing, configuring Kubernetes security contexts, network policies, pod security admission, runtime protection, Harbor registry hardening, regular scanning, monitoring, troubleshooting, and best‑practice recommendations.

Container SecurityKubernetesZero Trust
0 likes · 32 min read
Master Container Security: Complete Guide to Image Scanning and Zero‑Trust Runtime Protection
AntTech
AntTech
Oct 16, 2025 · Information Security

How Alipay’s Trusted Deep Defense System Secures Financial Transactions

Alipay’s trusted deep defense architecture, built on security parallel slices and trusted computing, was selected as a flagship case for the 2025 Important Industry Security Protection list, demonstrating zero‑false‑positive, zero‑miss, and zero‑business‑disruption protection against advanced threats such as 0‑day and APT attacks during high‑traffic events like Double 11.

Deep DefenseZero Trustcybersecurity
0 likes · 5 min read
How Alipay’s Trusted Deep Defense System Secures Financial Transactions
IT Architects Alliance
IT Architects Alliance
Oct 10, 2025 · Information Security

How to Secure Distributed Permissions: Zero Trust Strategies & Code

This article examines the exponential growth of permission complexity in micro‑service architectures, outlines zero‑trust design principles, and provides concrete Java and YAML implementations for fine‑grained, context‑aware access control, caching, dynamic evaluation, and audit monitoring.

Distributed SystemsSecurityZero Trust
0 likes · 11 min read
How to Secure Distributed Permissions: Zero Trust Strategies & Code
Volcano Engine Developer Services
Volcano Engine Developer Services
Oct 9, 2025 · Artificial Intelligence

Why AI Agents Risk Losing Control and How AgentArmor Secures Them

The article examines the emerging security challenges of AI agents, outlines four fundamental vulnerabilities, and introduces the AgentArmor framework—featuring a graph constructor, property registry, and type system—to compile agent behavior into verifiable programs and dramatically reduce attack success rates.

AI AgentAgentArmorProgram Dependency Graph
0 likes · 15 min read
Why AI Agents Risk Losing Control and How AgentArmor Secures Them
IT Architects Alliance
IT Architects Alliance
Oct 4, 2025 · Information Security

How Zero Trust and Service Mesh Secure Modern Microservices

This article examines the rising security risks in microservice architectures, explains why traditional perimeter defenses fall short, and presents a comprehensive zero‑trust strategy that combines service‑mesh mTLS, API‑gateway hardening, token‑exchange authentication, OPA policies, data‑level encryption, observability, and container‑level safeguards.

AuthenticationMicroservicesSecurity
0 likes · 11 min read
How Zero Trust and Service Mesh Secure Modern Microservices
ITPUB
ITPUB
Sep 27, 2025 · Information Security

Master SSH Security: Keys, Port Hiding, 2FA, Jump Hosts & Zero Trust

This guide walks through hardening SSH against massive brute‑force attacks by switching to ed25519 key authentication, disabling password logins, obscuring the default port, tightening user permissions, adding two‑factor authentication, configuring bastion hosts, setting connection limits, centralizing logs, rotating keys regularly, and adopting a zero‑trust architecture with HashiCorp Vault.

DevOpsLinuxSecurity
0 likes · 15 min read
Master SSH Security: Keys, Port Hiding, 2FA, Jump Hosts & Zero Trust
AntTech
AntTech
Sep 16, 2025 · Information Security

How Ant Group’s Aspect‑Fusion Intelligence Revolutionizes Cybersecurity Threat Detection

Ant Group’s award‑winning ‘Aspect Fusion Intelligence’ system, unveiled at the 2025 Zhejiang Cybersecurity Promotion Week, leverages AI, large models, blockchain and zero‑trust principles to tackle trillion‑scale data, rapid threat response, and financial‑grade reliability, setting new standards for intrusion detection.

AIZero Trustcybersecurity
0 likes · 5 min read
How Ant Group’s Aspect‑Fusion Intelligence Revolutionizes Cybersecurity Threat Detection
Baobao Algorithm Notes
Baobao Algorithm Notes
Jul 28, 2025 · Industry Insights

Why AWS Bedrock AgentCore Signals a New Era for Agentic AI Infrastructure

The article analyzes AWS Bedrock AgentCore and related hardware and software requirements for Agentic AI, covering runtime isolation with microVMs, memory architectures, identity and gateway design, zero‑trust networking, and the challenges of multi‑tenant KVCache and context engineering.

AWS BedrockAgentic AIInfrastructure
0 likes · 15 min read
Why AWS Bedrock AgentCore Signals a New Era for Agentic AI Infrastructure
Ops Development & AI Practice
Ops Development & AI Practice
Jun 27, 2025 · Information Security

How Teleport Redefines Secure Infrastructure Access in the Cloud‑Native Era

Teleport is an open‑source identity‑native access proxy that consolidates SSH, Kubernetes, databases, and internal web apps into a single, zero‑trust platform, replacing traditional bastion hosts, VPNs, and database gateways with short‑lived certificates, reverse tunnels, and unified audit logs for enhanced security and operational simplicity.

Cloud NativeDevOpsInfrastructure Access
0 likes · 9 min read
How Teleport Redefines Secure Infrastructure Access in the Cloud‑Native Era
Alibaba Cloud Native
Alibaba Cloud Native
Jun 24, 2025 · Cloud Native

How Nacos 3.0 Redefines Cloud‑Native Service Discovery for the AI Era

This article examines Nacos 3.0’s architectural evolution from Nacos 2.0, highlighting performance and extensibility upgrades, the new AI Registry with model, tool, and application layers, zero‑trust security enhancements, MCP Registry capabilities, and the roadmap toward a comprehensive AI‑native cloud‑native platform.

AI RegistryMCPNacos
0 likes · 14 min read
How Nacos 3.0 Redefines Cloud‑Native Service Discovery for the AI Era
Ops Development & AI Practice
Ops Development & AI Practice
Jun 14, 2025 · Information Security

Designing a Resilient Zero‑Trust Security Architecture on AWS for Small Ops Teams

This article outlines a comprehensive, financial‑grade security blueprint for a three‑person operations team using AWS services such as IAM, Secrets Manager, Session Manager, GuardDuty, and WAF, emphasizing Zero Trust, Least Privilege, and Defense‑in‑Depth to protect against external attacks, internal risks, and to enable clear audit trails for incident investigation.

AWSIAMOperations
0 likes · 13 min read
Designing a Resilient Zero‑Trust Security Architecture on AWS for Small Ops Teams
iQIYI Technical Product Team
iQIYI Technical Product Team
Jun 12, 2025 · Operations

How iQIYI’s “Qijing” Platform Revolutionizes Testing Across Devices and Teams

This article explores iQIYI’s comprehensive testing ecosystem, detailing industry trends, the platform’s multi‑terminal challenges, fragmented legacy solutions, and the unified, cloud‑native “Qijing” environment that streamlines test access, zero‑trust security, and real‑world validation for rapid product delivery.

Software qualityZero Trustcloud-native
0 likes · 20 min read
How iQIYI’s “Qijing” Platform Revolutionizes Testing Across Devices and Teams
Alibaba Cloud Developer
Alibaba Cloud Developer
Mar 17, 2025 · Information Security

How Alibaba Cloud Designs Secure DevSecOps Architecture: Lessons for Enterprises

This article details Alibaba Cloud’s practical experience in designing secure DevSecOps architectures, outlining the challenges of balancing development speed with security, the roles and processes for security architecture design, layered defense strategies, and zero‑trust implementations to help enterprises strengthen product security from the outset.

Alibaba CloudDevSecOpsSecurity Architecture
0 likes · 14 min read
How Alibaba Cloud Designs Secure DevSecOps Architecture: Lessons for Enterprises
21CTO
21CTO
Aug 23, 2024 · Information Security

Why Do Companies Fail at Data Security? Common Pitfalls and Solutions

This article examines why many enterprises repeatedly suffer data breaches, highlighting common security flaws such as manual permission management, account sharing, lack of least‑privilege, insufficient environment isolation, weak audit logging, and offers practical recommendations to strengthen information security.

Audit loggingZero Trustaccess control
0 likes · 14 min read
Why Do Companies Fail at Data Security? Common Pitfalls and Solutions
Architects Research Society
Architects Research Society
May 13, 2024 · Information Security

Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure

This article explains how Microsoft Dynamics 365 leverages Azure’s multi‑layer security architecture—including zero‑trust, encryption, role‑based access control, identity management, continuous monitoring, and compliance features—to safeguard data against threats and ensure privacy for enterprises adopting cloud ERP solutions.

AzureMicrosoft Dynamics 365RBAC
0 likes · 14 min read
Microsoft Dynamics 365 Data Security: How Microsoft Protects Your Data in Azure
Alibaba Cloud Native
Alibaba Cloud Native
Apr 19, 2024 · Information Security

Securing Nacos with Zero‑Trust: TLS, Encryption, and Access Control

This article explains how to protect Nacos configuration data by applying zero‑trust principles, covering transport encryption with TLS, storage encryption using plugins, and fine‑grained access control through authentication and RBAC, while providing practical configuration steps.

Configuration SecurityNacosRBAC
0 likes · 18 min read
Securing Nacos with Zero‑Trust: TLS, Encryption, and Access Control
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Dec 13, 2023 · Information Security

XiaoHongShu’s Zero Trust SASE Office Security Solution: Architecture, Challenges, and Implementation

XiaoHongShu’s award‑winning Zero‑Trust SASE Office Security Solution integrates all‑in‑one DLP, anti‑virus, identity‑bound access and distributed POPs to replace fragmented agents, delivering real‑time risk control, data‑non‑landing protection, multi‑level disaster recovery, and achieving 100% device coverage, an 80% reduction in data leakage and a 70% internal NPS after one year.

Office SecuritySASESecurity Architecture
0 likes · 14 min read
XiaoHongShu’s Zero Trust SASE Office Security Solution: Architecture, Challenges, and Implementation
Cloud Native Technology Community
Cloud Native Technology Community
Aug 8, 2023 · Cloud Native

Securing Cloud‑Native Applications: A Full‑Lifecycle Guide

This whitepaper explains how the shift to cloud‑native development reshapes security, analyzes the challenges of moving from perimeter‑based models to label‑driven protection, and offers practical recommendations for embedding security across development, distribution, deployment, and runtime stages.

SecurityZero Trustsoftware supply chain
0 likes · 8 min read
Securing Cloud‑Native Applications: A Full‑Lifecycle Guide
JD Tech
JD Tech
Apr 26, 2023 · Information Security

Overview of JD.com's Five‑Element Zero Trust Security Framework

This whitepaper outlines JD.com's practical zero‑trust security approach, detailing a five‑element framework that includes asset digitization, asset identity, diversified security checkpoints, a strategy center, and a zero‑trust cockpit, to help digital enterprises strengthen security, reduce costs, and meet regulatory requirements.

Digital TransformationJD.comZero Trust
0 likes · 6 min read
Overview of JD.com's Five‑Element Zero Trust Security Framework
Cloud Native Technology Community
Cloud Native Technology Community
Apr 6, 2023 · Industry Insights

What Sysdig’s 2023 Cloud‑Native Security Report Reveals About Container Risks

Sysdig’s 2023 Cloud‑Native Security and Usage Report uncovers that most container images carry critical vulnerabilities, a majority of granted permissions go unused, many containers lack proper CPU limits, and significant cloud‑cost waste persists, prompting urgent recommendations for identity‑access management, vulnerability prioritisation, and zero‑trust adoption.

Cloud NativeContainer SecurityResource Optimization
0 likes · 8 min read
What Sysdig’s 2023 Cloud‑Native Security Report Reveals About Container Risks
DevOps
DevOps
Mar 20, 2023 · Information Security

2023 DevSecOps Forecast: Five Key Trends Shaping Software Supply Chain Security, AI/ML Integration, and Observability

The 2023 DevSecOps forecast highlights five major trends—including prioritizing software supply‑chain security, embedding security education in DevOps, pervasive AI/ML across the SDLC, deeper value‑stream analysis, and left‑shifting observability—while emphasizing zero‑trust, SBOM adoption, and the growing role of security in cloud‑native environments.

AI/MLDevSecOpsSecurity
0 likes · 7 min read
2023 DevSecOps Forecast: Five Key Trends Shaping Software Supply Chain Security, AI/ML Integration, and Observability
MaGe Linux Operations
MaGe Linux Operations
Oct 18, 2022 · Information Security

Why VPNs Remain a Weak Link and How Zero‑Trust Secures Remote Access

During the COVID‑19 pandemic, reliance on traditional VPNs surged, exposing growing security risks, while Zscaler’s report highlights attackers exploiting VPN vulnerabilities and underscores that adopting a zero‑trust architecture can dramatically reduce attack surfaces and protect remote workforces.

Remote accessVPNZero Trust
0 likes · 6 min read
Why VPNs Remain a Weak Link and How Zero‑Trust Secures Remote Access
Alibaba Cloud Native
Alibaba Cloud Native
Oct 4, 2022 · Cloud Native

How Service Mesh Redefines Cloud‑Native Networking, Security, and Observability

This article explains the fundamentals of service mesh as a cloud‑native infrastructure layer, covering its control‑plane and data‑plane architecture, sidecar and waypoint proxies, L4/L7 decoupling, eBPF acceleration, zero‑trust security, traffic management, observability, and real‑world deployment scenarios.

Cloud NativeKubernetesObservability
0 likes · 20 min read
How Service Mesh Redefines Cloud‑Native Networking, Security, and Observability
Alibaba Cloud Developer
Alibaba Cloud Developer
Sep 9, 2022 · Information Security

How to Build a Comprehensive Cloud‑Native Kubernetes Security Monitoring System

This article examines the evolving security risks of cloud‑native architectures, explains why traditional perimeter defenses are insufficient, introduces zero‑trust principles for Kubernetes, outlines common K8s threat vectors, and presents a complete data‑collection and monitoring solution based on the open‑source iLogtail agent.

KubernetesObservabilityZero Trust
0 likes · 30 min read
How to Build a Comprehensive Cloud‑Native Kubernetes Security Monitoring System
AntTech
AntTech
Jun 21, 2022 · Information Security

Zero Trust Security Model and Technical Architecture for Ant Financial Office

This article examines the evolution from traditional perimeter‑based security to zero‑trust models, compares their advantages, presents industry case studies, and details Ant Financial’s integrated zero‑trust architecture—including SDP, IAM, and micro‑segmentation—along with implementation practices and future outlook.

IAMMicro SegmentationSDP
0 likes · 17 min read
Zero Trust Security Model and Technical Architecture for Ant Financial Office
DataFunSummit
DataFunSummit
May 17, 2022 · Information Security

Data Security Governance Practices and Frameworks: A Comprehensive Overview

This article presents a detailed overview of data security governance in China, covering policy milestones, major security incidents, current challenges, a three‑layer governance model, practical workflow steps, classification methods, emerging zero‑trust concepts, and real‑world case studies, offering actionable insights for organizations seeking robust data protection.

Big DataZero Trustdata security
0 likes · 11 min read
Data Security Governance Practices and Frameworks: A Comprehensive Overview
21CTO
21CTO
Apr 30, 2022 · Information Security

How Zero Trust Architecture Redefines Enterprise Security

This article explains the zero‑trust security model, its dynamic trust evaluation, common SDP components, three implementation approaches (application‑layer proxy, traffic‑layer proxy, hybrid), deployment scenarios for office, remote and data‑center environments, and practical steps for successful adoption.

Dynamic AuthenticationSDPZero Trust
0 likes · 14 min read
How Zero Trust Architecture Redefines Enterprise Security
58 Tech
58 Tech
Apr 28, 2022 · Information Security

Design and Implementation of the “Magic Butler” Zero‑Trust Security Management System

The article presents a comprehensive case study of the Magic Butler system—a zero‑trust security management solution developed by 58 Group’s TEG department—detailing its business drivers, design principles, architecture, key technical features, deployment scale, and future outlook for enterprise network security.

Endpoint ManagementZero Trustaccess control
0 likes · 14 min read
Design and Implementation of the “Magic Butler” Zero‑Trust Security Management System
IT Architects Alliance
IT Architects Alliance
Apr 19, 2022 · Information Security

How Zero Trust Redefines Enterprise Security: Architecture, Implementation, and Real‑World Practices

This article provides a comprehensive analysis of Zero Trust security, explaining its core principles, SDP‑based architecture, various implementation models—including user‑to‑resource and service‑to‑service schemes—deployment options, practical use cases, and guidance for successful enterprise adoption.

SDPZero Trustaccess control
0 likes · 16 min read
How Zero Trust Redefines Enterprise Security: Architecture, Implementation, and Real‑World Practices
Top Architect
Top Architect
Apr 18, 2022 · Information Security

Zero Trust Architecture: Concepts, Implementation Schemes, Deployment Practices, and Practical Experience

This article provides a comprehensive overview of zero‑trust security, explaining its core principles, architectural models such as SDP, various implementation approaches (application‑layer proxy, traffic‑layer proxy, hybrid), deployment patterns for office and multi‑branch environments, practical rollout experience, and how zero‑trust integrates with existing security products.

SDPSecurity DeploymentZero Trust
0 likes · 15 min read
Zero Trust Architecture: Concepts, Implementation Schemes, Deployment Practices, and Practical Experience
DevOps
DevOps
Mar 30, 2022 · Information Security

BeyondProd: Google’s Cloud‑Native Security Model for Microservices

This whitepaper explains Google’s BeyondProd security framework, detailing how cloud‑native microservice architectures replace traditional perimeter models with zero‑trust principles, mutual authentication, service mesh, and automated tooling such as ALTS, Binary Authorization, and gVisor to protect workloads across shared infrastructure.

BorgGoogleMicroservices
0 likes · 27 min read
BeyondProd: Google’s Cloud‑Native Security Model for Microservices
Zhongtong Tech
Zhongtong Tech
Mar 3, 2022 · Information Security

How ZTO’s “Box” Platform Merges Security and Collaboration in a Zero‑Trust Era

This article examines the origins, strategic importance, architecture, and key features of ZTO’s internally‑developed “Box” platform, illustrating how it unifies seamless user experience with deep security through zero‑trust principles, cross‑platform development, and integrated collaboration tools for a large logistics enterprise.

Cross‑platform developmentEnterprise SoftwareZero Trust
0 likes · 26 min read
How ZTO’s “Box” Platform Merges Security and Collaboration in a Zero‑Trust Era
Architects' Tech Alliance
Architects' Tech Alliance
Dec 17, 2021 · Operations

Overview of Data Processing Units (DPUs) and Their Role in Modern Data Centers

This article provides a comprehensive overview of Data Processing Units (DPUs), tracing their evolution from smart NICs, explaining their architecture, advantages such as workload offloading, zero‑trust security, and compute‑storage separation, and discussing future trends and NVIDIA's roadmap for integrated CPU‑GPU‑DPU solutions in data‑center and edge environments.

DPUData centerNetwork Acceleration
0 likes · 15 min read
Overview of Data Processing Units (DPUs) and Their Role in Modern Data Centers
Alibaba Cloud Native
Alibaba Cloud Native
Dec 12, 2021 · Cloud Native

How Alibaba Cloud Service Mesh ASM Enables Zero‑Trust Security for Kubernetes

This article explains how the Alibaba Cloud Service Mesh (ASM) implements a zero‑trust security model for Kubernetes microservices, covering workload identity, mutual TLS, request authentication with JWT, authorization policies, OPA integration, performance optimizations, and step‑by‑step deployment commands, while referencing official guidance and practical examples.

Zero Trustcloud-nativeservice-mesh
0 likes · 18 min read
How Alibaba Cloud Service Mesh ASM Enables Zero‑Trust Security for Kubernetes
Architects' Tech Alliance
Architects' Tech Alliance
Oct 12, 2021 · Cloud Computing

2021 Cloud Computing Top Ten Keywords and Development Trends

The 2021 Trusted Cloud Conference in Beijing unveiled ten key cloud computing trends—including cloud native, high‑performance computing, chaos engineering, hybrid cloud, edge computing, zero‑trust, optimized governance, digital government, low‑carbon cloud, and enterprise digital transformation—highlighting the strategic direction of China's cloud industry.

Digital TransformationEdge ComputingZero Trust
0 likes · 8 min read
2021 Cloud Computing Top Ten Keywords and Development Trends
OPPO Amber Lab
OPPO Amber Lab
Aug 10, 2021 · Information Security

AI, IoT, and Zero Trust: Key Takeaways from the 2021 ACM China Turing Conference

At the 2021 ACM China Turing Conference in Hefei, leading academics and industry experts presented cutting‑edge research on AI‑driven security, mobile OS vulnerability detection, IoT sensor risks, ARM confidential computing, and zero‑trust frameworks, highlighting how emerging technologies reshape secure mobile and industrial ecosystems.

AIARMIoT
0 likes · 7 min read
AI, IoT, and Zero Trust: Key Takeaways from the 2021 ACM China Turing Conference
Architects' Tech Alliance
Architects' Tech Alliance
Jul 27, 2021 · Cloud Computing

2021 Cloud Computing Top Ten Keywords and Emerging Trends

At the 2021 Trusted Cloud Conference, the China Academy of Information and Communications Technology released the top ten cloud computing keywords—cloud native, high performance, chaos engineering, hybrid cloud, edge computing, zero trust, optimized governance, digital government, low‑carbon cloud, and enterprise digital transformation—highlighting their significance and future development directions.

Digital TransformationEdge ComputingZero Trust
0 likes · 9 min read
2021 Cloud Computing Top Ten Keywords and Emerging Trends
Beike Product & Technology
Beike Product & Technology
Jun 18, 2021 · Information Security

Zero Trust Network Architecture: Components and Implementation

This article details the design and implementation of a zero‑trust network architecture, covering policy modeling (SARE), management realms, decision center components, L4/L7 gateways, security clients, risk assessment, and integration with SIEM for continuous trust evaluation.

SARE ModelSIEM IntegrationZero Trust
0 likes · 13 min read
Zero Trust Network Architecture: Components and Implementation
Tencent Cloud Developer
Tencent Cloud Developer
Mar 29, 2021 · Information Security

What Is Zero Trust? Benefits, Technologies, and Deployment Guide

This article explains the Zero Trust security model, its advantages over traditional perimeter defenses, core technologies such as SDP, IAM, and micro‑segmentation, implementation principles, essential components, real‑world deployment scenarios, future trends, and Tencent's practical contributions to the industry.

IAMSDPZero Trust
0 likes · 16 min read
What Is Zero Trust? Benefits, Technologies, and Deployment Guide
Cloud Native Technology Community
Cloud Native Technology Community
Dec 25, 2020 · Cloud Native

How Istio Secures Service Mesh: Zero‑Trust, mTLS, and AAA Explained

This article examines Service Mesh security by outlining core requirements, detailing Istio’s built‑in zero‑trust mechanisms—including mutual TLS, AAA, and automatic certificate rotation—and comparing the security features of Linkerd and Alauda Service Mesh, offering practical insights for designing robust microservice protection.

Cloud NativeIstioLinkerd
0 likes · 11 min read
How Istio Secures Service Mesh: Zero‑Trust, mTLS, and AAA Explained
Programmer DD
Programmer DD
Jun 24, 2020 · Information Security

How Google’s BeyondProd Redefines Cloud‑Native Security

This article translates Google’s 2019 BeyondProd whitepaper, explaining the shift from perimeter‑based to zero‑trust cloud‑native security, the key terminology, design motivations, core security principles, internal tools such as ALTS, Binary Authorization, gVisor, and concrete examples of data‑access and code‑change flows.

GoogleSecurityZero Trust
0 likes · 33 min read
How Google’s BeyondProd Redefines Cloud‑Native Security
Python Programming Learning Circle
Python Programming Learning Circle
Feb 8, 2020 · Artificial Intelligence

Nine Recommended Programming Books for Home Learning

During the stay‑at‑home period, this article suggests nine concise programming books covering Python neural networks, web crawling, deep learning with PyTorch, machine learning fundamentals, zero‑trust network security, classic programming pearls, Python mathematics, AI algorithms, and Vim text processing, each with brief descriptions and images.

AIDeep LearningVim
0 likes · 9 min read
Nine Recommended Programming Books for Home Learning
Youzan Coder
Youzan Coder
Oct 23, 2019 · Information Security

Breaking the Ceiling of Traditional Internet Security with Decentralized Trust

The article analyzes why conventional antivirus, firewall, and intrusion‑detection approaches have reached their limits, identifies trust as the root cause of internet security problems, and proposes a decentralized architecture using blockchain, IPFS, and zero‑trust principles to rebuild identity, network, computing, and storage with intrinsic security.

BlockchainEthereumIPFS
0 likes · 21 min read
Breaking the Ceiling of Traditional Internet Security with Decentralized Trust
Efficient Ops
Efficient Ops
Jan 24, 2019 · Information Security

How Alibaba Scales Host Security Across Its Global Economic Ecosystem

This talk outlines Alibaba’s massive global host infrastructure, the evolving security governance from manual controls to data‑driven, automated systems, the challenges of compliance and operational efficiency, and future directions such as zero‑trust and invisible security.

Host SecurityOperationsSecurity Governance
0 likes · 16 min read
How Alibaba Scales Host Security Across Its Global Economic Ecosystem