aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About

Posts by tag

Security

223 posts
View Post
  • 4 min
  • Engineering
  • Practices

Seven Zero Trust Rules For Kubernetes

Every day, the drumbeat to adopt Zero Trust in tech infrastructure amplifies. Like any cybersecurity buzzword, Zero Trust is both more and less than it seems. As more, it holds…
View Post
Share
View Post
  • 3 min
  • Engineering

Extend Chrome Security Reporting To CrowdStrike Falcon LogScale

Security insights are a critical piece of a secure enterprise browsing solution. Integrating your chosen security solution with Chrome, made possible by Chrome Enterprise Connectors Framework, gives IT and security…
View Post
Share
View Post
  • 5 min
  • Engineering
  • Practices

Practicing The Principle Of Least Privilege With Cloud Build And Artifact Registry

People often use Cloud Build and Artifact Registry in tandem to build and store software artifacts – these include container images, to be sure, but also OS packages and language…
View Post
Share
View Post
  • 4 min
  • Cloud-Native
  • Design
  • Engineering
  • Practices

Zero Trust For Cloud-Native Workloads: Mitigating Future Log4j Incidents

In my previous blog post, I introduced the brief history of zero trust, the core pillars of a zero-trust model, and how to build a zero-trust model for cloud-native workloads.…
View Post
Share
View Post
  • 8 min
  • Engineering

Cloud CISO Perspectives: October 2022

Welcome to October’s Cloud CISO Perspectives. This month, we’re focusing on our just-completed Google Cloud Next conference and Mandiant’s inaugural mWise Conference, and what our slate of cybersecurity announcements can…
View Post
Share
View Post
  • 3 min
  • Engineering
  • Solutions

Introducing Assured Workloads In Canada And Australia, And New Features For All

At Google Cloud, we continue to invest in our vision of invisible security where advanced capabilities are engineered into our platforms, operations are simplified, and stronger outcomes can be achieved.…
View Post
Share
View Post
  • 3 min
  • Engineering
  • Technology

Announcing New GKE Functionality For Streamlined Security Management

At Google Cloud, we’re driven by a vision of invisible security, where advanced security capabilities are engineered into our platforms, operations are simplified, and stronger security outcomes can be achieved.…
View Post
Share
View Post
  • 4 min
  • Data
  • Engineering

Cloud Makes It Better: What’s New And Next For Data Security

Today’s digital economy offers a wealth of opportunities, but those opportunities come with growing risks. It has become increasingly important to manage the risks posed by the intersection of digital…
View Post
Share
View Post
  • 3 min
  • Solutions
  • Tools

CUF Boosted Security, Reduced Costs, And Drove Energy Savings With ChromeOS

Editor’s note: Today’s post is by José Manuel Vera, CIO, Portugal, of CUF. CUF is Portugal’s largest private healthcare provider. Previously known as the José de Mello Saúde, CUF has…
View Post
Share
View Post
  • 2 min
  • Solutions

Introducing Sensitive Actions To Help Keep Accounts Secure

At Google Cloud, we operate in a shared fate model, working in concert with our customers to help achieve stronger security outcomes. One of the ways we do this is…
View Post
Share

Posts pagination

Previous 1 … 7 8 9 10 11 … 23 Next

Stay Connected!
LATEST
  • What is cloud bursting?
    • June 18, 2025
  • What is confidential computing?
    • June 17, 2025
  • Oracle adds xAI Grok models to OCI
    • June 17, 2025
  • Fine-tune your storage-as-a-service approach
    • June 16, 2025
  • 5
    Advanced audio dialog and generation with Gemini 2.5
    • June 15, 2025
  • 6
    A Father’s Day Gift for Every Pop and Papa
    • June 13, 2025
  • 7
    Global cloud spending might be booming, but AWS is trailing Microsoft and Google
    • June 13, 2025
  • Google Cloud, Cloudflare struck by widespread outages
    • June 12, 2025
  • What is PC as a service (PCaaS)?
    • June 12, 2025
  • 10
    Apple services deliver powerful features and intelligent updates to users this autumn
    • June 11, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Crayon targets mid-market gains with expanded Google Cloud partnership
    • June 10, 2025
  • By the numbers: Use AI to fill the IT skills gap
    • June 11, 2025
  • 3
    Apple supercharges its tools and technologies for developers to foster creativity, innovation, and design
    • June 9, 2025
  • Apple-WWDC25-Apple-Intelligence-hero-250609 4
    Apple Intelligence gets even more powerful with new capabilities across Apple devices
    • June 9, 2025
  • Apple-WWDC25-Liquid-Glass-hero-250609_big.jpg.large_2x 5
    Apple introduces a delightful and elegant new software design
    • June 9, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.