Safe operation
-
Why identity and access control governance is at the heart of SaaS security
SaaS application users and logins are potential threats; whether they are bad actors or potentially disgruntled former colleagues, identity management and access control are critical to preventing unwanted or mistaken entry into an organization's data and systems. Since businesses have thousands of users…
-
Thoughts on security protection after Google experienced APT attack
The following is adapted from remarks delivered by Global Affairs President Kent Walker at the 2022 Cybersecurity International Conference on July 19, 2022. Thank you for the opportunity to participate in this important conversation about cybersecurity. At Google, I…
-
Alibaba Cloud Zero Trust Practice: Identity and Network Micro-Isolation in Production Networks
Overview: Since Forrester analyst John Kindwig proposed the term "Zero Trust" in 2010, with the rise of the digital economy and remote working, Zero Trust has gradually moved from concept to implementation. As a new generation of network…