×
Cybersecurity

Pháo Đài Bảo Mật Điện Toán Đám Mây: Sức Mạnh Của Alibaba Cloud Trong Việc Bảo Vệ Doanh Nghiệp Việt Nam

Trong kỷ nguyên số hiện đại, bảo mật thông tin trở thành một trong những ưu tiên hàng đầu cho các doanh nghiệp, đặc biệt là tại thị trường đang phát triển nhanh chóng như Việt Nam.

Ushering Web3 Growth: Building Encryption and Data Security Across the Decentralized Web

While Web3 emerges as the next significant evolution of the internet, it poses security challenges that demand immediate attention.

Tackling Ransomware Challenges: A Comprehensive Security Center and Cloud Firewall Approach

Zero-Day Resilience: Ransomware Defense with Cloud Firewall and Security Center Ransomware is a type of malicious program or malware that threatens vi.

Exploring Top 4 Alibaba Cloud ISV Solutions in Diverse Industries

Alibaba Cloud Independent Software Vendors (ISVs) is here to empower your digital transformation. In collaboration with industry-leading partners such.

WAF Capabilities on Handling Common Web App Vulnerability

In the realm of web security, the strategic deployment of a Web Application Firewall (WAF) stands as a pivotal measure to fortify the defense mechanis.

Alibaba Cloud in Cybersecurity

This article explores Alibaba Cloud's commitment to cybersecurity, examining its comprehensive suite of security tools, partnerships with industry lea...

How Important is Data Security for the Financial Industry?

Data is the lifeblood of the financial industry. 91% of financial companies worldwide think they have data security risks.

Red Team vs Blue Team Defined

This article explores the concepts of Red Team and Blue Team in cybersecurity, describing their roles and activities in testing and improving an organization's security posture.

What is Dork?

The article provides an overview of the concept of "dorks" in the field of cybersecurity.

Cloud Computing and Cyber Security Paves the Path to Fourth Industrial Revolution

Cloud Computing is at the heart of the Fourth Industrial Revolution (4IR) in which technology emerges as the key enabler within societies.

Enhancing Data Privacy: Unleashing the Potential of the Alibaba Cloud Data Security Center

Data security has now become major concern for companies, organizations, government authorities, and even individuals alike.

Global MNC Network Design with Fortinet Secured SD-WAN Solution

Best Practices for a Global MNC Network Design with Fortinet Secured SD-WAN Solution Industry

Data Insights in Cybersecurity Part 1: Intro to ssdeep and XOR.DDoS Case Study

In this article, I describe how my team at Alibaba Cloud implemented fuzzy hashing at scale, showing visualizations of our XOR DDoS detection.

Protos Labs: The Asia Star of the Joint Singapore-Thailand Demo Day

Protos Labs impressed the judges with its threat-based cyber risk quantification methodology and proactive cybersecurity services for the insurance industry.

MVP #FridayFive: Fintech, HA PostgreSQL Cluster, Multi-Account Management, and Cybersecurity

Alibaba Cloud MVP Friday Five is a blog column to share interesting and helpful content brought by global Alibaba Cloud MVPs.

Five Insights on Network Security | RSA Conference 2017

Alibaba Group chief security expert Xiao Li shares his insights on the trends of network security in the one, five, or even ten years may have profoun.

CERT Analysis on IoT Botnet and DDoS Attacks

This article discusses the importance of IoT device security by looking at CERT's interpretation of the infamous 2016 DDoS attack.

FortiGuard Labs Report – Exponential Growth of IoT Device Attacks

With this article, we will get a glimpse of the trends in the exponential increase of the security attacks on IoT devices.

Battle-Tested Ways to Respond to a Ransomware Attack

Ransomware attacks have taken businesses by storm. Make sure you have an incident response plan that involves timely detection, backups, well-thought-out system recovery techniques, etc.

The Evolution of Security – Web Application Firewall

A firewall is a system that logically sits between one or more computers and their connection to the Internet.