×
Web Application Firewall

How to Integrate Alibaba Cloud Log Service with Splunk Using the SLS Add-On

This article discusses how to integrate Log Service with Splunk using add-ons to ensure compliance, auditing, and other related logs can be ingested into your Security Operation Center.

Deploy and Configure FortiGate A-P HA Cross AZ: Part 3

This is the third article of a 3-part series that provides step-by-step guide for deploying FortiGate HA on Alibaba Cloud between availability zones.

Deploy and Configure FortiGate A-P HA Cross AZ: Part 2

This is the second article of a 3-part series that provides step-by-step guide for deploying FortiGate HA on Alibaba Cloud between availability zones.

Deploy and Configure FortiGate A-P HA Cross AZ: Part 1

This is the first article of a 3-part series that provides step-by-step guide for deploying FortiGate HA on Alibaba Cloud between availability zones.

How to Use Bastionhost to Securely Access Your Workload in the Cloud

In this blog post, we'll show you how you can use Alibaba Cloud Bastionhost to manage all of your resources in a secure and centralized manner.

What is Web Application Firewall (WAF) and How It Works?

A firewall is a system that logically sits between one or more computers and their connection to the Internet.

Four Common Web Application Security Flaws and What You Can Do to Resolve Them

This blog helps you understand the basics of application security and common network attacks.

How the Cloud Can Help Businesses Gain a Real-Time Understanding

Cloud computing presents businesses of all shapes and sizes with a new route to digital success, without letting your budget run away from you.

How Can You Tackle Network Attacks on CDN Edge Nodes?

Zhao Wei, a senior technical expert with Alibaba Cloud, explains how to build a multi-layer in-depth protection system on CDN edge nodes

8 Ways Alibaba Cloud Security Is Supporting the Fight against COVID-19

In this blog post, we'll discuss the security services developed by Alibaba that were critical in helping organizations in China during the COVID-19 outbreak.

Cloud-based Security Service Provisioning: The Future of Cybersecurity

This blog post shares the parallels of cybersecurity with epidemics and discusses the importance of cloud security operations for enterprises.

We've Just Made a Grand Slam!

Alibaba Cloud WAF was recognized by Gartner, Forrester, Frost and Sullivan, and IDC, as a competitive leader in cloud security.

How to Combat Bots in Today's Digital Age

Discover how you can protect your businesses from the ever-changing and growing number of cyberattacks present in our digital world with Alibaba Cloud.

How Do Alibaba Engineers Recover Data That's Lost

This article explores how Continuous Data Protection (CDP) can mitigate the risk of data loss and provide an efficient data recovery mechanism.

New Outbreak of h2Miner Worms Exploiting Redis RCE Detected

In this post, we'll discuss the recent outbreak of h2Miner worms, which exploit Redis's Remote Command Execution (RCE), and also share some useful security tips by the Alibaba Cloud Security team.

What Defenders Must Do to Fight Hackers and Cyber Attacks Using More Powerful Weapons?

By Wu Fan (Wufan) and Guo Weibo (Sangduo) Special thanks to: Huangxing, Cangbo, Muming, Xijun, Ziyi, Xuzheng, Nanxun, Suddy (In no particular order) ...

Cloud Security for Websites - HTTP Flood Protection

This article explains how to analyze and prevent HTTP flood attacks on websites using Alibaba Cloud's Web Application Firewall.

Decoding the AI Defense System Behind Alibaba Cloud Web Application Firewall (WAF)

This article explains how the AI defense system of Alibaba Cloud's WAF solves security challenges concerning open-loop problem spaces and asymmetric positive and negative spaces.

Learn the Strategies and Tactics of Cryptocurrency Mining Trojans

This article will look at some common technologies and development trends of cryptocurrency mining Trojans, showing you how you can better project yourself.

Solr Dataimport Vulnerability Becomes a New Attack Method for Mining Organizations

Alibaba Cloud security team has detected a new attack method using the Solr dataimport RCE vulnerability (CVE-2019-0193) that implants mining programs into target hosts.