aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About

Posts by tag

Security

223 posts
View Post
  • 2 min
  • Technology

In Case You Missed It: Google Cloud Security Talks, Threat Detection & Response Edition

We recently held our first Google Cloud Security Talks event of 2022. The event focused on all things security operations (SecOps) across on-premises, cloud and hybrid environments. We shared product…
View Post
Share
View Post
  • 4 min
  • Engineering

Accelerating Government Compliance With Google Cloud’s Professional Service Organization

Did you know that by 2025, enterprise IT spending on public cloud computing will overtake traditional IT spending? In fact, 51% of IT spend in application software, infrastructure software, business…
View Post
Share
View Post
  • 4 min
  • Engineering
  • Tools

Powering Security Operations With Context-Aware Detections, Alert Prioritization And Risk Scoring In Google Chronicle

With today’s rapidly escalating threat landscape, it is important that our customers have access to relevant context across their entire IT stack, whether it’s in the cloud, on-premise, or a…
View Post
Share
View Post
  • 3 min
  • Tech

Protect Your Users’ Accounts With ReCAPTCHA Enterprise’s Account Defender

reCAPTCHA Enterprise is Google’s online fraud detection service that leverages over a decade of experience defending the internet. reCAPTCHA Enterprise can be used to prevent fraud and attacks perpetrated by…
View Post
Share
View Post
  • 4 min
  • Platforms

Google Cloud’s Security And Resiliency Measures For Customers And Partners

As the tragic Russian invasion of Ukraine continues, we want to provide customers and partners with an update on how Google Cloud is providing resources for organizations, protecting against potential…
View Post
Share
View Post
  • 6 min
  • Engineering

Cloud CISO Perspectives: February 2022

As the war in Ukraine continues to unfold, I want to update you on how we’re supporting our customers and partners during this time. Google is taking a number of…
View Post
Share
View Post
  • 8 min
  • Design
  • Engineering

How Healthcare Can Strengthen Its Own Cybersecurity Resilience

With all the crises that have buffeted the healthcare and life sciences industries the past two years, one that often gets overlooked is the unceasing wave of cyberattacks aimed at…
View Post
Share
View Post
  • 7 min
  • Engineering

Achieving Autonomic Security Operations: Automation As A Force Multiplier

As we discussed in “Achieving Autonomic Security Operations: Reducing toil”, your Security Operations Center (SOC) can learn lessons from Site Reliability Engineering (SRE) This means that applying software engineering practices…
View Post
Share
View Post
  • 3 min
  • Platforms
  • Solutions

How A Zero Trust Approach Protects Governments And Constituents Against Fraud

With the rise in digital services, government programs that distribute money to constituents are facing serious identity fraud challenges. In 2020, the massive increase in available benefits attracted significant fraudulent…
View Post
Share
View Post
  • 3 min
  • Computing
  • Engineering

Protecting Customers Against Cryptomining Threats With VM Threat Detection In Security Command Center

As organizations move to the cloud, VM-based architectures continue to make up a significant portion of compute-centric workloads. To help ensure strong protection for these deployments, we are thrilled to…
View Post
Share

Posts pagination

Previous 1 … 15 16 17 18 19 … 23 Next

Stay Connected!
LATEST
  • What is cloud bursting?
    • June 18, 2025
  • What is confidential computing?
    • June 17, 2025
  • Oracle adds xAI Grok models to OCI
    • June 17, 2025
  • Fine-tune your storage-as-a-service approach
    • June 16, 2025
  • 5
    Advanced audio dialog and generation with Gemini 2.5
    • June 15, 2025
  • 6
    A Father’s Day Gift for Every Pop and Papa
    • June 13, 2025
  • 7
    Global cloud spending might be booming, but AWS is trailing Microsoft and Google
    • June 13, 2025
  • Google Cloud, Cloudflare struck by widespread outages
    • June 12, 2025
  • What is PC as a service (PCaaS)?
    • June 12, 2025
  • 10
    Apple services deliver powerful features and intelligent updates to users this autumn
    • June 11, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Crayon targets mid-market gains with expanded Google Cloud partnership
    • June 10, 2025
  • By the numbers: Use AI to fill the IT skills gap
    • June 11, 2025
  • 3
    Apple supercharges its tools and technologies for developers to foster creativity, innovation, and design
    • June 9, 2025
  • Apple-WWDC25-Apple-Intelligence-hero-250609 4
    Apple Intelligence gets even more powerful with new capabilities across Apple devices
    • June 9, 2025
  • Apple-WWDC25-Liquid-Glass-hero-250609_big.jpg.large_2x 5
    Apple introduces a delightful and elegant new software design
    • June 9, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.