Data Security
-
Data Security Intelligence Body: AI-driven paradigm for next-generation enterprise data security protection
With the rapid evolution of Large Language Model (LLM) technology and the deepening of enterprise digital transformation, the traditional passive data security protection system has been difficult to meet the defense needs of modern threats. The first data security intelligence in China realizes the paradigm shift from "artificial stacking" to "intelligent initiative" by integrating generative AI, adaptive protection mechanism, multi-intelligence collaboration and other cutting-edge technologies.
-
CSO: A Chief Security Officer's Guide to Full-Link Security for Artificial Intelligence Data
Chief Security Officers (CSOs) are facing an unprecedented challenge: AI systems are both amplifying existing data risks and introducing entirely new threats such as data poisoning, model reverse engineering, and supply chain contamination. This guide builds on the NIST AI Risk Management Framework (AI RMF), the Google Secure AI Framework (SAIF), and industry practices to provide CSOs with an actionable data security governance system.
-
Safe operations from the perspective of Party A and Party B
Large Internet enterprises in the exploration of enterprise information security, and gradually put forward the concept of security operations. For the ultimate guarantee of enterprise security needs, but also as an important responsibility of security operations, it is necessary to close the loop on all aspects of enterprise security through security operations practitioners.
-
How to implement secure and trusted data security encryption in your business?
Encryption of critical business data is an important measure to prevent leakage and unauthorized access to an organization's sensitive information. By implementing strong encryption technologies and strategies, organizations can mitigate business risks in the development of digital transformation and maintain the confidentiality, integrity and availability of their core data assets. But how should organizations choose the right encryption technologies, methods and tools?
-
Remote desktop AnyDesk hacked, user data security at risk!
AnyDesk, the well-known remote desktop software, has been hacked and some of its data compromised. The company has taken steps to fix the vulnerability and is advising users to reset their passwords and download the latest version of the software.
-
Cloudflare suspected of being attacked by state-sponsored hacker group
Cloudflare has disclosed that it was subjected to a potential national-level hack in which attackers illegally accessed its Atlassian servers through stolen credentials and ultimately accessed some of the documentation and limited source code.
-
Google sued for tracking users in incognito mode, agrees to pay $5 billion settlement
Google agreed to pay $5 billion to settle a privacy lawsuit alleging that the company tracked users in incognito mode. The lawsuit accused Google of using tools such as Google Analytics to collect data on users even when they thought they were browsing privately.
-
[Trial] Ministry of Industry and Information Technology launches emergency response plan for classification and classification of data security incidents
On December 16, 2023, the Ministry of Industry and Information Technology (MIIT) published a draft proposal on Friday, detailing the measures for the implementation of the "Data Security Law" and "Measures for the Management of Data Security in the Industrial and Information Technology Sector (Trial)" plan.
-
Agent Racoon malicious backdoor attacks organizations in the Middle East, Africa and other countries
"This malware family is written using the .NET framework and leverages the Domain Name Service (DNS) protocol to create...
-
Breaking News: National Data Administration discusses data infrastructure for the first time
Promote the construction of data infrastructure and contribute to the development of my country's data industry.