网络安全
Search documents
山石网科:预计2025年全年净亏损1.80亿元—2.20亿元
2 1 Shi Ji Jing Ji Bao Dao· 2026-01-27 09:57
Core Viewpoint - The company, 山石网科, is forecasting a significant net loss for the year 2025, attributed to a combination of weak demand in the cybersecurity industry and increased competition, alongside rising costs and reduced government subsidies [1] Financial Performance - The expected net profit attributable to shareholders for 2025 is projected to be between -220 million yuan and -180 million yuan, indicating a net loss of 180 million to 220 million yuan [1] - The net profit excluding non-recurring gains and losses is anticipated to be between -225 million yuan and -185 million yuan [1] Revenue Outlook - The company's revenue for 2025 is expected to decline compared to the previous year, primarily due to a continued weak demand from downstream customers in the cybersecurity sector and intensified market competition [1] - The company has seen a significant increase in the opportunity reserve for its ASIC security products, with successful bids for projects in leading sectors such as securities and energy, exceeding expectations [1] Product Development - The company has successfully tested its ASIC security dedicated chip and plans to scale up supply in the first half of 2026, which has not yet contributed significantly to the 2025 revenue [1] Cost Factors - The company is facing increased costs due to a substantial rise in component prices, particularly memory modules, which have seen price increases of 3-5 times [1] - High R&D expenditures are being maintained to support the development of ASIC security chips, alongside significant costs related to internal organizational adjustments [1] - There has been an increase in impairment losses and a decrease in government subsidies and VAT refunds for software product sales compared to the previous year [1]
2026年国内代理IP排行榜:原生纯净社媒运营/直播带货首选
Sou Hu Cai Jing· 2026-01-27 08:17
Core Insights - The article emphasizes the importance of having a reliable and clean IP address for social media operations and e-commerce activities, particularly in the context of increasing platform scrutiny and regulations [2][3]. Group 1: Importance of IP Address - A stable and unique IP address acts as a "real home" in the online world, providing a secure environment for accounts and reducing the risk of being flagged by platforms [2]. - The use of a suitable proxy IP service is now considered essential for managing multiple accounts on platforms like TikTok and for domestic live streaming operations [2]. Group 2: IPIPGO Overview - IPIPGO is highlighted as a leading choice for overseas operations, offering over 90 million residential IPs from more than 240 countries, ensuring a genuine user experience [3]. - The service includes a TikTok-specific line that optimizes connections for better engagement rates, as users report improved push and interaction rates after using IPIPGO [3]. Group 3: Flexibility of IPIPGO - IPIPGO supports both dynamic and static IP types, catering to different operational needs, such as data collection or long-term account management [4]. - The service also offers private dedicated proxy servers for enhanced security and stability [4]. Group 4: Tianqi HTTP Overview - Tianqi HTTP specializes in domestic operations, providing a wide coverage and high-speed stable domestic proxy IP services, essential for platforms like Douyin and Kuaishou [5]. - The service boasts a 99% availability rate and response times under 10 milliseconds, crucial for live streaming where real-time performance is critical [5]. Group 5: Features of Tianqi HTTP - Tianqi HTTP offers flexible pricing plans, including short-term dynamic IPs for bulk tasks and long-term static IPs for consistent operations [5][6]. - The service supports various authentication methods and provides APIs for easy integration into operational systems [6]. Group 6: Comparison of IPIPGO and Tianqi HTTP - A comparison table outlines the key features of IPIPGO and Tianqi HTTP, emphasizing their respective strengths in overseas and domestic markets [7]. - The choice between the two services should be based on specific business needs, such as location and IP purity requirements [7]. Group 7: Selection Process for Proxy IP - The article suggests a three-step process for selecting the appropriate proxy IP service, including identifying core needs, conducting practical tests, and considering long-term service support [8][9]. - Testing the services in real business scenarios is crucial to ensure they meet operational requirements [8]. Group 8: Common Questions - The article addresses common queries regarding the necessity of proxy IPs for small operations, the choice between dynamic and static IPs for live streaming, and the speed of proxy services [11][12][13]. - It also advises on using a combination of services for businesses operating in both domestic and overseas markets [14].
未来产业及战略产业快速发展,李雪莹建议完善相关行业人才培养政策
Jin Rong Jie· 2026-01-27 07:56
Group 1 - The core viewpoint emphasizes that innovation is the primary driving force for development, while security is the prerequisite and bottom line for innovative development. A controlled and traceable open scenario is necessary to address security bottlenecks in emerging fields [1][2][3] - New types of security risks include inherent technical risks such as AI model algorithm defects and unreliable output decisions, as well as physical security incidents from attacks on new energy systems and cross-domain security challenges from 6G applications. These risks exceed traditional network and data security protections [1][2] - The rapid iteration of new technologies and business models, coupled with insufficient investment in security research and delayed protective technology development, creates a dilemma for security companies, making it difficult to form targeted solutions due to high replication costs and complex scenarios [1][2] Group 2 - The national and municipal levels in Beijing are placing significant emphasis on the innovation and safety standards of emerging fields, establishing a comprehensive support system through strategic planning, special policies, and legal regulations [2] - Recommendations include creating a "limited, controllable, and traceable" open scenario management system, which involves clarifying responsibilities and processes, establishing online platforms for resource coordination, and incentivizing companies with policy support [2][3] - As a leading company in the cybersecurity industry, Tianrongxin has accumulated solid practical results in areas such as large model security and energy security, advocating for a balance between safety and innovation through institutional innovation [3]
山东移动淄博分公司:数智赋能织密反诈网 筑牢财产“防火墙”
Qi Lu Wan Bao· 2026-01-27 07:12
Core Viewpoint - Shandong Mobile Zibo Branch has established a comprehensive anti-fraud governance system focusing on responsibility implementation, police-enterprise collaboration, source control, and public education to protect the financial interests of the public. Group 1: Responsibility Implementation - The company has integrated anti-fraud work into the cybersecurity assessment system, creating a responsibility mechanism led by top management and involving local departments to ensure effective implementation of preventive measures [2]. Group 2: Police-Enterprise Collaboration - The company emphasizes a combined approach of prevention and crackdown, actively participating in local anti-fraud defense systems. It has implemented strict verification processes for new accounts and has assisted law enforcement in dismantling over 70 fraud dens and seizing more than 180 fraudulent devices [3]. Group 3: Source Control - A closed-loop management mechanism focusing on the entire cycle from card issuance to usage and monitoring has been established. The company has achieved 100% coverage in verification and warning reminders, and has intervened in over 600 potential fraud cases [4]. Group 4: Public Awareness and Education - The company has innovated a multi-dimensional publicity model, conducting over 120 anti-fraud educational activities targeting key demographics such as the elderly and students. It has sent more than 16.5 million anti-fraud public service messages and created tailored educational materials [5]. Group 5: Future Directions - The company plans to enhance its "technology-driven anti-fraud and ecological co-governance" model by increasing investments in AI and big data technologies, and strengthening information sharing and collaboration with law enforcement and cybersecurity departments [5].
工商银行取得用于防范网络攻击方法专利
Sou Hu Cai Jing· 2026-01-27 04:47
国家知识产权局信息显示,中国工商银行股份有限公司取得一项名为"用于防范网络攻击的方法、装 置、设备、介质和程序产品"的专利,授权公告号CN118200021B,申请日期为2024年4月。 声明:市场有风险,投资需谨慎。本文为AI基于第三方数据生成,仅供参考,不构成个人投资建议。 来源:市场资讯 天眼查资料显示,中国工商银行股份有限公司,成立于1985年,位于北京市,是一家以从事货币金融服 务为主的企业。企业注册资本35640625.7089万人民币。通过天眼查大数据分析,中国工商银行股份有 限公司共对外投资了28家企业,参与招投标项目5000次,财产线索方面有商标信息969条,专利信息 5000条,此外企业还拥有行政许可79个。 ...
突发!美得州把 26 家中国科技公司拉黑
是说芯语· 2026-01-27 03:09
Core Viewpoint - Texas Governor Greg Abbott has expanded the list of prohibited technologies, adding 26 Chinese tech companies and AI platforms, to mitigate security risks associated with foreign adversaries [1][3][4]. Group 1: Prohibited Technologies - The updated list includes various AI institutions such as Zhipu AI, Baichuan Intelligence, and MiniMax, as well as hardware manufacturers like Hisense and tech companies including ByteDance, Baidu, Alibaba, CATL, and TP-Link [1][6][7]. - The Texas Cyber Command (TXCC) is responsible for assessing threats and identifying high-risk technologies to protect sensitive information [1][5][6]. Group 2: Security Concerns - Governor Abbott expressed concerns about hostile actors using AI and other technologies to harvest user data, manipulate users, and compromise their safety [4][5]. - The TXCC aims to prevent cyber attacks that could lead to the exfiltration of sensitive information to malicious entities globally [5][6]. Group 3: Implementation and Oversight - The prohibition is based on a threat assessment conducted by TXCC, which was established in June 2023 as the largest state-level cybersecurity department in the U.S. [6][1]. - The directive to expand the prohibited technologies list was communicated through a letter to key state officials, emphasizing the need for vigilance against foreign threats [4][5].
永信至诚1月26日获融资买入1147.53万元,融资余额1.36亿元
Xin Lang Cai Jing· 2026-01-27 01:43
Core Viewpoint - Yongxin Zhicheng experienced a decline of 5.51% on January 26, with a trading volume of 101 million yuan, indicating potential market volatility and investor sentiment concerns [1]. Financing Summary - On January 26, Yongxin Zhicheng had a financing buy amount of 11.48 million yuan and a financing repayment of 11.99 million yuan, resulting in a net financing buy of -0.51 million yuan [1]. - The total financing and margin trading balance for Yongxin Zhicheng reached 136 million yuan, accounting for 3.77% of its market capitalization, which is above the 60th percentile of the past year [1]. - The company had a margin balance of 271,000 yuan with a margin volume of 11,400 shares, exceeding the 90th percentile of the past year, indicating a high level of short selling activity [1]. Business Performance - As of September 30, Yongxin Zhicheng reported a total revenue of 142 million yuan for the first nine months of 2025, reflecting a year-on-year decrease of 17.72% [2]. - The company recorded a net profit attributable to shareholders of -54.85 million yuan, a significant decline of 73.68% compared to the previous year [2]. Shareholder Information - As of September 30, 2025, Yongxin Zhicheng had 6,011 shareholders, a decrease of 0.96% from the previous period, while the average number of circulating shares per shareholder increased by 0.96% to 12,126 shares [2]. - The company has distributed a total of 36.03 million yuan in dividends since its A-share listing [3]. - Notably, two funds, Bosera Military Industry Theme Stock A and Bosera Emerging Growth Mixed, have exited the list of the top ten circulating shareholders [3].
2026年中国防火墙行业发展历程、产业链、市场规模、竞争格局及发展趋势研判:市场集中度较高,市场稳步发展,定制化防火墙产品将不断涌现[图]
Chan Ye Xin Xi Wang· 2026-01-27 01:22
Core Insights - The firewall market in China is expected to grow from $1.17 billion in 2016 to $3.02 billion by 2025, with a projected market size of $3.156 billion in 2026, driven by policy support, market demand growth, and technological advancements [1][7] - The deployment of 5G, private networks, and industrial internet is creating significant opportunities for dedicated firewalls in critical information infrastructure [1][14] - The rise of edge computing is increasing the demand for lightweight firewalls, while customized firewall products for scenarios like IoT and smart cities are emerging [1][14] Firewall Industry Definition and Classification - A firewall is an access control product that creates barriers between internal networks and insecure external networks, preventing unauthorized access and attacks [2][6] - Firewalls can be categorized based on technology (traditional firewalls, UTM firewalls, next-generation firewalls, and AI firewalls) and form (software, hardware, and chip-level firewalls) [4][5] Current State of the Firewall Industry - The firewall industry in China is experiencing steady growth due to increasing market demand and technological advancements [6][7] - The industry value chain includes upstream components (hardware and software), midstream firewall products, and downstream applications across various sectors such as government, finance, telecommunications, and healthcare [6][8] Development History of the Firewall Industry - The evolution of firewalls began in the late 1980s with the introduction of packet-filtering firewalls, leading to more complex solutions to address evolving security threats [9][10] - The introduction of AI firewalls by Huawei in 2018 marked a significant innovation in the industry, providing solutions for advanced threats [9] Competitive Landscape of the Firewall Industry - The firewall market in China is highly concentrated, with Huawei and H3C leading the market with shares of 28% and 22% respectively, followed by other companies like Tianrongxin and Deepin Technology [10][11] - The competitive tiers include a first tier of leading companies, a second tier of mid-sized firms, and a third tier of smaller companies [10] Key Companies in the Firewall Industry - Tianrongxin, established in 1995, has maintained the largest market share in firewalls for 25 years, with a focus on diverse security products and services [11][12] - Deepin Technology specializes in enterprise-level network security and has a significant presence in the market, with a notable share in the unified threat management category [12][13] Future Trends in the Firewall Industry - The firewall market is expected to mature as the overall information security market stabilizes and grows, with increasing awareness and demand for security solutions [13][14] - UTM solutions are anticipated to replace traditional firewalls, leading to significant changes in market dynamics and opportunities for leading UTM vendors [13][14]
天威视讯(002238.SZ):与中资网安签署战略合作协议
Sou Hu Cai Jing· 2026-01-26 12:18
格隆汇1月26日丨天威视讯(002238.SZ)公布,公司与中资网络信息安全科技有限公司(简称"中资网 安")签署《战略合作协议》。双方将充分应用大数据分析、数据挖掘等前沿科技技术,通过建设安全 运营分中心方式,为深圳市属国资国企提供网络安全运营支撑,同时开拓党政机关、企事业单位、政务 云、电子政务外网、关键基础设施等重点行业和关键领域的网络安全运营支撑,以及集成、咨询、运 维、人才培养等安全业务。 ...
机构:到2026年中国网络安全整体市场规模有望突破800亿元
Huan Qiu Wang Zi Xun· 2026-01-26 08:20
Core Insights - The Chinese cybersecurity market is experiencing steady growth, driven by enhanced policies, increased corporate investment in security, and accelerated application of new technologies. IDC forecasts that the overall market size will exceed 80 billion RMB by 2026, with a compound annual growth rate (CAGR) of 8.9% from 2024 to 2029 [1][2] Group 1 - The cybersecurity industry is at a critical turning point, facing a more complex development phase characterized by escalating threats. New attack methods such as ransomware, supply chain attacks, and AI-driven attacks are emerging, posing greater challenges for organizations in terms of protection, response, and operations [1] - The widespread adoption of new IT architectures, including cloud-native, multi-cloud, hybrid cloud, industrial internet, and the Internet of Things (IoT), is reshaping security boundaries and significantly increasing the complexity of security management. Traditional point products are inadequate to address overall risks [1] Group 2 - New growth drivers are emerging in the cybersecurity market, with continuous demand being released in areas such as data security, critical information infrastructure protection, and industrial control and IoT security due to the improvement of policies and regulations [2] - The application of AI and automation technologies is facilitating the evolution of security capabilities from "passive defense" to "active perception and intelligent operation," indicating a shift towards higher quality development in the security market [2]