aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About

Posts by tag

Security

223 posts
View Post
  • 7 min
  • Technology

Overcoming Objections And Unblocking The Road To Zero Trust

Overcoming blockades and potholes that threaten to derail organizational change is key to any IT or security transformation initiative. Many security and risk leaders have made it a priority to…
View Post
Share
View Post
  • 2 min
  • Technology

Google Cloud Completes Korea Financial Security Institute Audit

Financial Services institutions (FSIs) are among the most heavily regulated enterprises, and often have explicit and detailed obligations to assess and audit activities they outsource. For FSIs, due diligence of…
View Post
Share
View Post
  • 2 min
  • Practices
  • Solutions

Google Public Sector Announces Continuity-Of-Operations Offering For Government Entities Under Cyberattack

Cyberattacks that target our government are all too common these days. From SolarWinds, to hacks against widely used email servers, to attacks against the defense industrial base, we know that…
View Post
Share
View Post
  • 8 min
  • Engineering
  • Technology

Cloud CISO Perspectives: November 2022

Welcome to November’s Cloud CISO Perspectives. I’d like to celebrate the first year of the Google Cybersecurity Action Team (GCAT) and look ahead to the team’s goals for 2023.As with…
View Post
Share
View Post
  • 5 min
  • Engineering
  • Practices
  • Solutions
  • Technology

CISO Survival Guide: How Financial Services Organizations Can More Securely Move To The Cloud

It’s not just children and adults who face excitement and nervousness on the first day of school. The first day in the cloud can be daunting for financial services organizations,…
View Post
Share
View Post
  • 5 min
  • Solutions
  • Technology

How Data Embassies Can Strengthen Resiliency With Sovereignty

Embassies have been havens for the people of countries they represent for hundreds of years, helping reduce some risks that their citizens can face when traveling and living abroad. The…
View Post
Share
View Post
  • 6 min
  • Technology

Darktrace Sees Strong Demand For PREVENT™ Products As Organizations Seek Proactive Cyber Security Solutions

·      New data commissioned by Darktrace shows almost two-thirds of organizations do not have high confidence in identifying their greatest vulnerabilities ·      81% believe AI technology would help them to automate their…
View Post
Share
View Post
  • 2 min
  • Solutions
  • Technology

Announcing Assured Workloads For Israel In Preview

In October, we announced the opening of a new Google Cloud region in Israel. The region, me-west1, joins our global network of cloud regions delivering high-performance, low-latency access to cloud…
View Post
Share
View Post
  • 5 min
  • Design
  • Engineering

For A Successful Cloud Transformation, Change Your Culture First

Twenty years ago, organizations discovered the magic of server virtualization. Among the many benefits of virtualization, it heralded the end of the need for one physical server per application and…
View Post
Share
View Post
  • 5 min
  • Engineering
  • Practices

When Should I Use Cloud Armor?

Google Cloud Armor is a well known enterprise-grade DDoS defense and web application firewall service that provides additional security for your applications and websites running on Google Cloud, on-prem or…
View Post
Share

Posts pagination

Previous 1 … 6 7 8 9 10 … 23 Next

Stay Connected!
LATEST
  • What is cloud bursting?
    • June 18, 2025
  • What is confidential computing?
    • June 17, 2025
  • Oracle adds xAI Grok models to OCI
    • June 17, 2025
  • Fine-tune your storage-as-a-service approach
    • June 16, 2025
  • 5
    Advanced audio dialog and generation with Gemini 2.5
    • June 15, 2025
  • 6
    A Father’s Day Gift for Every Pop and Papa
    • June 13, 2025
  • 7
    Global cloud spending might be booming, but AWS is trailing Microsoft and Google
    • June 13, 2025
  • Google Cloud, Cloudflare struck by widespread outages
    • June 12, 2025
  • What is PC as a service (PCaaS)?
    • June 12, 2025
  • 10
    Apple services deliver powerful features and intelligent updates to users this autumn
    • June 11, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Crayon targets mid-market gains with expanded Google Cloud partnership
    • June 10, 2025
  • By the numbers: Use AI to fill the IT skills gap
    • June 11, 2025
  • 3
    Apple supercharges its tools and technologies for developers to foster creativity, innovation, and design
    • June 9, 2025
  • Apple-WWDC25-Apple-Intelligence-hero-250609 4
    Apple Intelligence gets even more powerful with new capabilities across Apple devices
    • June 9, 2025
  • Apple-WWDC25-Liquid-Glass-hero-250609_big.jpg.large_2x 5
    Apple introduces a delightful and elegant new software design
    • June 9, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.