aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About

Posts by tag

Security

223 posts
View Post
  • 4 min
  • Automation
  • Engineering
  • People
  • Solutions

5 Ways A SOAR Solution Improves SOC Analyst Onboarding

Editor’s note: This blog was originally published by Siemplify on Feb. 19, 2021. The number of unfilled cybersecurity jobs stretches into the millions, and a critical part of the problem…
View Post
Share
View Post
  • 3 min
  • Data
  • Design
  • Engineering
  • Practices

Introducing Password Policies For Cloud SQL For PostgreSQL And MySQL Local Users

Preventing data breaches is an important priority when creating and managing database environments. Ensuring user and application passwords meet high security standards is crucial for reducing risk and helping to…
View Post
Share
View Post
  • 3 min
  • Engineering

How To Introduce More Empathy Into Security Operations

Editor’s note: This blog was originally published by Siemplify on April 29, 2021. With cybersecurity moving from backroom to boardroom, and the societal imperative that workplace cultures renounce toxicity for…
View Post
Share
View Post
  • 4 min
  • Engineering

Identity & Access Management: Authentication With Cloud Identity

In security, the three “A”s of controlling access are Authentication (Who is the user?), Authorization (What is the user allowed to do?), and Auditing (What are they doing?) Going a…
View Post
Share
View Post
  • 4 min
  • Data
  • Engineering
  • Practices

Providing Our EU Education Customers’ With Data Transfer Protections To Support Privacy Assessments

Recently, Datatilsynet (the Danish Data Protection Authority) issued a ruling emphasizing the importance of conducting proper due diligence before implementing cloud services. We agree due diligence is an important step…
View Post
Share
View Post
  • 5 min
  • Engineering
  • Practices

Google Supports CSRB Call For Open Source Security Improvements In Wake Of Log4j Report

The U.S. Department of Homeland Security (DHS) recently announced the results of the first report from the Cyber Safety Review Board (CSRB) on the log4j software library vulnerabilities discovered in…
View Post
Share
View Post
  • 3 min
  • Platforms

Security Monitoring In Google Cloud

Moving to the cloud comes with the fundamental question of how to effectively manage security and risk posture. From a Security Operations (SecOps) perspective, there are few core requirements that…
View Post
Share
View Post
  • 4 min
  • Design
  • Engineering

How To Think About Threat Detection In The Cloud

As your organization transitions from on-premises to hybrid cloud or pure cloud, how you think about threat detection must evolve as well—especially when confronting threats across many cloud environments. A…
View Post
Share
View Post
  • 5 min
  • Design
  • Engineering
  • Solutions
  • Tools

Invest Early, Save Later: Why Shifting Security Left Helps Your Bottom Line

Shifting left on security with Google Cloud infrastructure The concept of “shifting left” has been widely promoted in the software development lifecycle. The concept is that introducing security earlier, or…
View Post
Share
View Post
  • 4 min
  • Design
  • Engineering

Network & Application Security In Google Cloud

Google owns and operates one of the largest backbone networks in the world to connect its data centers. When your traffic is on the Google network, it no longer transits…
View Post
Share

Posts pagination

Previous 1 … 11 12 13 14 15 … 23 Next

Stay Connected!
LATEST
  • What is cloud bursting?
    • June 18, 2025
  • What is confidential computing?
    • June 17, 2025
  • Oracle adds xAI Grok models to OCI
    • June 17, 2025
  • Fine-tune your storage-as-a-service approach
    • June 16, 2025
  • 5
    Advanced audio dialog and generation with Gemini 2.5
    • June 15, 2025
  • 6
    A Father’s Day Gift for Every Pop and Papa
    • June 13, 2025
  • 7
    Global cloud spending might be booming, but AWS is trailing Microsoft and Google
    • June 13, 2025
  • Google Cloud, Cloudflare struck by widespread outages
    • June 12, 2025
  • What is PC as a service (PCaaS)?
    • June 12, 2025
  • 10
    Apple services deliver powerful features and intelligent updates to users this autumn
    • June 11, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Crayon targets mid-market gains with expanded Google Cloud partnership
    • June 10, 2025
  • By the numbers: Use AI to fill the IT skills gap
    • June 11, 2025
  • 3
    Apple supercharges its tools and technologies for developers to foster creativity, innovation, and design
    • June 9, 2025
  • Apple-WWDC25-Apple-Intelligence-hero-250609 4
    Apple Intelligence gets even more powerful with new capabilities across Apple devices
    • June 9, 2025
  • Apple-WWDC25-Liquid-Glass-hero-250609_big.jpg.large_2x 5
    Apple introduces a delightful and elegant new software design
    • June 9, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.