This article discusses how to integrate Log Service with Splunk using add-ons to ensure compliance, auditing, and other related logs can be ingested into your Security Operation Center.
This is the third article of a 3-part series that provides step-by-step guide for deploying FortiGate HA on Alibaba Cloud between availability zones.
This is the second article of a 3-part series that provides step-by-step guide for deploying FortiGate HA on Alibaba Cloud between availability zones.
This is the first article of a 3-part series that provides step-by-step guide for deploying FortiGate HA on Alibaba Cloud between availability zones.
In this blog post, we'll show you how you can use Alibaba Cloud Bastionhost to manage all of your resources in a secure and centralized manner.
A firewall is a system that logically sits between one or more computers and their connection to the Internet.
This blog helps you understand the basics of application security and common network attacks.
Cloud computing presents businesses of all shapes and sizes with a new route to digital success, without letting your budget run away from you.
Zhao Wei, a senior technical expert with Alibaba Cloud, explains how to build a multi-layer in-depth protection system on CDN edge nodes
In this blog post, we'll discuss the security services developed by Alibaba that were critical in helping organizations in China during the COVID-19 outbreak.
This blog post shares the parallels of cybersecurity with epidemics and discusses the importance of cloud security operations for enterprises.
Alibaba Cloud WAF was recognized by Gartner, Forrester, Frost and Sullivan, and IDC, as a competitive leader in cloud security.
Discover how you can protect your businesses from the ever-changing and growing number of cyberattacks present in our digital world with Alibaba Cloud.
This article explores how Continuous Data Protection (CDP) can mitigate the risk of data loss and provide an efficient data recovery mechanism.
In this post, we'll discuss the recent outbreak of h2Miner worms, which exploit Redis's Remote Command Execution (RCE), and also share some useful security tips by the Alibaba Cloud Security team.
By Wu Fan (Wufan) and Guo Weibo (Sangduo) Special thanks to: Huangxing, Cangbo, Muming, Xijun, Ziyi, Xuzheng, Nanxun, Suddy (In no particular order) ...
This article explains how to analyze and prevent HTTP flood attacks on websites using Alibaba Cloud's Web Application Firewall.
This article explains how the AI defense system of Alibaba Cloud's WAF solves security challenges concerning open-loop problem spaces and asymmetric positive and negative spaces.
This article will look at some common technologies and development trends of cryptocurrency mining Trojans, showing you how you can better project yourself.
Alibaba Cloud security team has detected a new attack method using the Solr dataimport RCE vulnerability (CVE-2019-0193) that implants mining programs into target hosts.