Taobao Marketplace

taobao.com

Launched in May 2003, Taobao Marketplace (www.taobao.com) is the online shopping destination of choice for Chinese consumers looking for wide selection, value and convenience. Shoppers choose from a wide range of products and services on Taobao Marketplace, which features hundreds of millions of product and service listings. Taobao Marketplace was China's largest online shopping destination in terms of gross merchandise volume in 2013, according to iResearch. In addition, the Mobile Taobao App was the most popular mobile commerce app in China from August 2012 to July 2014 in terms of mobile monthly active users, according to iResearch. Taobao Marketplace is a business within Alibaba Group.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Data Security, Platform Security, Software Security

ATTACKERS USE AUTOMATION TO SPEED FROM EXPLOIT TO COMPROMISE ACCORDING TO LACEWORK LABS CLOUD THREAT REPORT

Lacework | October 14, 2022

news image

Lacework®, the data-driven cloud security company, today released the fourth Lacework Labs Cloud Threat Report and subsequently launched a new, open source tool for cloud hunting and security efficacy testing. The new tool, known as Cloud Hunter, will help customers keep pace with ever-improving adversarial tradecraft through advanced environmental analysis and improved incident response time. Developed in response to new types of sophisticated threat models uncovered through ...

Read More

INCREASE IN ACCOUNT TAKEOVER ATTACKS ON E-RETAIL AMIDST COVID-19

SC Magazine | March 23, 2020

news image

Masses of global citizens have been retreating to their homes and relying on online services to stock up their domiciles during the coronavirus pandemic, and it could be having an influence on cyberattacks against websites. Researchers at application protection company PerimeterX have reported a two-month increase in Read More

Data Security, Platform Security, Software Security

CONTRAST SECURITY LAUNCHES EXPANDED SECURITY TESTING TOOLS FOR JAVASCRIPT AND POPULAR ANGULAR, REACT AND JQUERY FRAMEWORKS

Contrast Security | October 07, 2022

news image

Contrast Security (Contrast), the leader in code security that empowers developers to secure as they code, today announced the expansion of its Secure Code Platform's static application security testing (SAST) capabilities to include JavaScript language support along with support for Angular, React and jQuery frameworks, which will allow developers to quickly find and fix security defects in their client-side code. With this new Contrast Scan addition, application security and development te...

Read More

Data Security, Platform Security, Software Security

DATADOG LAUNCHES CLOUD SECURITY MANAGEMENT TO PROVIDE CLOUD NATIVE APPLICATION PROTECTION

Datadog | October 20, 2022

news image

Datadog, Inc., the monitoring and security platform for cloud applications, today announced the general availability of Cloud Security Management. This product brings together capabilities from Cloud Security Posture Management (CSPM), Cloud Workload Security (CWS), alerting, incident management and reporting in a single platform to enable DevOps and Security teams to identify misconfigurations, detect threats and secure cloud-native applications. As organizations' cloud archi...

Read More
news image

Data Security, Platform Security, Software Security

ATTACKERS USE AUTOMATION TO SPEED FROM EXPLOIT TO COMPROMISE ACCORDING TO LACEWORK LABS CLOUD THREAT REPORT

Lacework | October 14, 2022

Lacework®, the data-driven cloud security company, today released the fourth Lacework Labs Cloud Threat Report and subsequently launched a new, open source tool for cloud hunting and security efficacy testing. The new tool, known as Cloud Hunter, will help customers keep pace with ever-improving adversarial tradecraft through advanced environmental analysis and improved incident response time. Developed in response to new types of sophisticated threat models uncovered through ...

Read More
news image

INCREASE IN ACCOUNT TAKEOVER ATTACKS ON E-RETAIL AMIDST COVID-19

SC Magazine | March 23, 2020

Masses of global citizens have been retreating to their homes and relying on online services to stock up their domiciles during the coronavirus pandemic, and it could be having an influence on cyberattacks against websites. Researchers at application protection company PerimeterX have reported a two-month increase in Read More

news image

Data Security, Platform Security, Software Security

CONTRAST SECURITY LAUNCHES EXPANDED SECURITY TESTING TOOLS FOR JAVASCRIPT AND POPULAR ANGULAR, REACT AND JQUERY FRAMEWORKS

Contrast Security | October 07, 2022

Contrast Security (Contrast), the leader in code security that empowers developers to secure as they code, today announced the expansion of its Secure Code Platform's static application security testing (SAST) capabilities to include JavaScript language support along with support for Angular, React and jQuery frameworks, which will allow developers to quickly find and fix security defects in their client-side code. With this new Contrast Scan addition, application security and development te...

Read More
news image

Data Security, Platform Security, Software Security

DATADOG LAUNCHES CLOUD SECURITY MANAGEMENT TO PROVIDE CLOUD NATIVE APPLICATION PROTECTION

Datadog | October 20, 2022

Datadog, Inc., the monitoring and security platform for cloud applications, today announced the general availability of Cloud Security Management. This product brings together capabilities from Cloud Security Posture Management (CSPM), Cloud Workload Security (CWS), alerting, incident management and reporting in a single platform to enable DevOps and Security teams to identify misconfigurations, detect threats and secure cloud-native applications. As organizations' cloud archi...

Read More

Resources

resource image

Data Security, Enterprise Identity, Enterprise Security

Is coding required for Cyber Security?

Video

resource image

Data Security, Enterprise Security, Network Threat Detection

Abnormal Security Cloud Email Security Integrates with Azure Active Directory

Video

resource image

Data Security, Enterprise Identity, Enterprise Security

Is coding required for Cyber Security?

Video

resource image

Data Security, Enterprise Security, Network Threat Detection

Abnormal Security Cloud Email Security Integrates with Azure Active Directory

Video

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us