Workflow
数据安全
icon
Search documents
2025年国家网络安全宣传周——网络安全知识科普,建议学习+收藏!
Sou Hu Cai Jing· 2025-09-16 10:07
Core Viewpoint - The 2025 National Cybersecurity Awareness Week emphasizes the theme "Cybersecurity for the People, Cybersecurity Relies on the People," focusing on high-level security to safeguard high-quality development. The event aims to promote cybersecurity knowledge and skills across society while implementing key cybersecurity laws and regulations [1]. Group 1: Cybersecurity Laws and Regulations - The Cybersecurity Law of the People's Republic of China, enacted on June 1, 2017, is the first comprehensive law regulating cybersecurity management in the country [5]. - The Data Security Law, effective from September 1, 2021, serves as a foundational law in the data sector and is crucial for national security [8][9]. - The Personal Information Protection Law, effective from November 1, 2021, aims to protect personal information rights and regulate the processing of personal data [11]. Group 2: Key Infrastructure Security - The Critical Information Infrastructure Security Protection Regulations, effective from September 1, 2021, are the first administrative regulations specifically targeting the security of critical information infrastructure [6][7]. - Critical information infrastructure includes essential sectors such as energy, transportation, and finance, where damage or data breaches could severely threaten national security and public interest [16]. Group 3: Cybersecurity Threats and Prevention - Cyber threats include telecom fraud, information leakage, and malicious software, which pose significant risks to individuals and organizations [2]. - Phishing attacks, including spear phishing and business email compromise, are common tactics used by cybercriminals to deceive individuals and organizations [24][25]. - Recommendations for preventing cyber threats include protecting personal information, verifying sender identities, and using secure channels for transactions [42][52].
【网络安全宣传周】网络安全知识科普
Sou Hu Cai Jing· 2025-09-16 09:15
Group 1 - The core theme of the 2025 National Cybersecurity Awareness Week is "Cybersecurity for the People, Cybersecurity Relies on the People," emphasizing high-level security to safeguard high-quality development [1] - The event aims to promote the implementation of key cybersecurity laws and regulations, including the Cybersecurity Law, Data Security Law, and Personal Information Protection Law, among others [1][12] - The initiative seeks to raise public awareness about cybersecurity risks such as telecom fraud, information leakage, and malicious software while showcasing achievements in the cybersecurity field since the 18th National Congress of the Communist Party of China [1] Group 2 - The Cybersecurity Law, enacted on June 1, 2017, is China's first comprehensive law regulating cybersecurity management, marking a significant milestone in the country's legal framework for cyberspace [3] - The Critical Information Infrastructure Security Protection Regulations, effective from September 1, 2021, are the first administrative regulations specifically addressing the security of critical information infrastructure [4][5] - The Data Security Law, which took effect on September 1, 2021, serves as a foundational law in the data sector and is crucial for national security [6][7] Group 3 - The Personal Information Protection Law, effective from November 1, 2021, aims to protect personal information rights and regulate personal information processing activities [9] - The Cybersecurity Review Measures, revised and effective from February 15, 2022, are designed to further ensure cybersecurity and data security while safeguarding national security [10] - The Generative Artificial Intelligence Service Management Interim Measures, effective from August 15, 2023, are the first normative policies in China targeting generative AI services [11]
中美马德里成果公布,中方用10个字总结,特朗普宣布一个重磅消息
Sou Hu Cai Jing· 2025-09-16 04:01
Group 1 - The core stance of the negotiations is to maintain fairness and address issues such as the US-China tariff war and TikTok, with both sides awaiting final outcomes [1][3] - The Chinese delegation, led by Vice Premier He Lifeng and trade negotiator Li Chenggang, emphasized "honest, in-depth, and constructive communication" regarding TikTok, aiming to reduce investment barriers and promote national consensus [5][11] - China firmly stated it will not sacrifice principles for unreasonable agreements, particularly concerning TikTok, highlighting a balance between openness and a strong stance on rights protection [7][9] Group 2 - The meeting in Madrid is seen as a pragmatic step in a complex international economic environment, with both sides finding common ground on issues like TikTok and establishing a framework for ongoing communication [30][32] - The US has placed 23 Chinese entities on an "entity list," prompting a swift response from China, indicating a quick and resolute counteraction to US measures [11][13] - The meeting's outcomes are viewed positively by investors, as evidenced by a rise in US stock index futures and an increase in the offshore RMB against the USD, reflecting expectations for improved economic relations [20][24]
英伟达之后 微软被曝暗藏“后门”
Jing Ji Guan Cha Wang· 2025-09-16 03:57
Core Viewpoint - The article highlights concerns regarding Microsoft's UCPD.sys, which allegedly contains hidden mechanisms that restrict Chinese software and potentially compromise user data security, raising alarms about privacy and national security [1][2][3]. Group 1: UCPD.sys Functionality - UCPD.sys is designed to protect user settings from being altered by third-party software, but it has been found to include a blacklist of numerous Chinese companies, effectively blocking their applications from modifying default settings [2][3]. - The program operates differently in various regions; in the EU, it complies with the Digital Markets Act (DMA) by allowing users to change default applications freely, while in China, it enforces restrictions that can revert settings to Microsoft’s defaults [3][4]. Group 2: Data Monitoring and Privacy Concerns - UCPD.sys actively monitors system changes and can execute hidden programs without user consent, raising significant privacy concerns as it may act as a backdoor for data collection [4][5]. - The driver collects detailed logs of user activity, including software usage and system modifications, which can be sent to Microsoft servers, potentially revealing sensitive information about user habits and preferences [5][6]. Group 3: Broader Implications and Historical Context - The article references past incidents where U.S. tech companies, including Microsoft, have been implicated in security breaches targeting Chinese entities, suggesting a pattern of behavior that could threaten critical infrastructure [6][7]. - The ongoing scrutiny of Microsoft’s practices has prompted calls for investigations and increased awareness among users regarding the risks associated with reliance on foreign software [7][8].
控股股东认定结果不一致!石头科技赴港上市收反馈意见
Shen Zhen Shang Bao· 2025-09-16 03:38
Core Insights - Beijing Stone Technology Co., Ltd. (Stone Technology) is preparing for a Hong Kong IPO and has received feedback from the China Securities Regulatory Commission (CSRC) regarding the need for additional documentation related to overseas issuance and data security concerns [1] Group 1: Regulatory Feedback - The CSRC has requested Stone Technology to clarify its business scope, particularly regarding its value-added telecommunications services and whether it complies with the 2024 Negative List for foreign investment [1] - The company must provide details on its websites, apps, and mini-programs, including the scale of user data collection and storage, and measures for data protection before and after the IPO [1] - There is a need to explain inconsistencies in the identification of the controlling shareholder and provide a conclusive legal opinion on this matter [1] Group 2: Financial Performance - Stone Technology has experienced continuous revenue growth since its 2020 listing, with annual revenue increasing from 4.53 billion to 11.94 billion from 2020 to 2024, achieving a doubling of scale [2] - Despite revenue growth, the company reported a decline in net profit for 2024, with a net profit of 1.977 billion, down 3.64% year-on-year, and a non-recurring net profit of 1.620 billion, down 11.26% [2] - In the first half of 2025, revenue reached 7.903 billion, a year-on-year increase of 78.96%, but net profit fell by 39.55% to 678 million, with a significant drop in cash flow from operating activities to -823 million [2] Group 3: Customer Complaints - There has been a continuous stream of complaints on the Black Cat Complaint platform regarding Stone Technology, primarily related to product quality issues such as cleaning efficiency and path navigation, as well as after-sales service challenges like repair difficulties and refusal to replace products [3]
联合实验室专家陈雷:希望大湾区成为数据安全使用典范
Nan Fang Du Shi Bao· 2025-09-16 02:49
Core Insights - Generative artificial intelligence is a core driving force behind the new technological and industrial revolution, serving as an important engine for cultivating new productive forces and injecting new momentum into high-quality economic development [1] - The establishment of the Guangdong-Hong Kong-Macao Greater Bay Area Generative Artificial Intelligence Safety Development Joint Laboratory aims to create an innovative ecosystem that integrates government, industry, academia, research, and application, focusing on enterprise development, industry implementation, and safety regulation [1][2] Group 1: Data Quality and Integration - Data quality is crucial in the training of large models, and the Joint Laboratory is expected to integrate research capabilities from various universities to guide the correct use of data from policy and institutional levels [2][3] - The laboratory aims to create a big data platform by consolidating data from various universities in the Greater Bay Area, facilitating model testing and performance evaluation [3][9] Group 2: Data Security and Governance - Data security poses significant challenges, requiring a balance between data integration and safety, with suggestions for using techniques like homomorphic encryption and privacy computing for AI training [5][8] - The laboratory is expected to establish a collaborative governance system for data security and AI safety, promoting data sharing while ensuring privacy protection [5][7] Group 3: AI Talent Development - The Joint Laboratory is seen as a platform for AI talent cultivation, advocating for a "1+1" model where students spend one year in academic learning and another year in industry practice to bridge the gap between education and real-world application [6][7] Group 4: Future Expectations - There is an expectation for the Joint Laboratory to form more alliances and agreements to promote data security usage, creating a virtuous cycle of data sharing and safety in the Greater Bay Area [7] - The laboratory is also anticipated to focus on the safety of large models, ensuring their outputs are reliable and controllable while addressing new risks such as data poisoning [8][9]
X @外汇交易员
外汇交易员· 2025-09-16 00:48
中国国家互联网信息办公室副主任王京涛指出,中美双方在充分尊重企业意愿和市场规律的基础上,就通过TikTok美国用户数据和内容安全业务委托运营、算法等知识产权使用权授权等方式解决TikTok问题,达成了基本共识。中国政府将依法审批TikTok所涉及的技术出口、知识产权使用权授权等事宜。外汇交易员 (@myfxtrader):新华社通稿:双方就以合作方式妥善解决TikTok相关问题,减少投资障碍,促进有关经贸合作等达成了基本框架共识 https://t.co/Me8hcec9aE ...
让大湾区成为数据安全使用典范
Nan Fang Du Shi Bao· 2025-09-15 23:10
Core Insights - The most critical aspect of artificial intelligence development is data quality, as emphasized by the Director of the Information Hub at Hong Kong University of Science and Technology (Guangzhou) [2][10] - The establishment of a collaborative laboratory in the Guangdong-Hong Kong-Macao Greater Bay Area aims to integrate research capabilities from various universities to enhance the safe development of generative AI [2][4][10] Data Quality - Data quality is essential for effective AI applications, and the laboratory aims to create a big data platform for testing large models and improving their performance [4][10] - The laboratory will explore new methods to ensure data quality, including collaboration with industry to accumulate high-quality data for practical applications [4][9] Data Security - Data security poses significant challenges, requiring a balance between data integration and safety, with suggestions for using techniques like homomorphic encryption and privacy computing [5][9] - The laboratory is expected to establish a data security governance framework that includes both technical solutions and policy guidance to ensure proper data usage [5][8] AI Model Development - The successful application of large models in industries depends on their practical use, with examples provided from the insurance sector where large models can streamline claims processing [6][10] - The laboratory is tasked with addressing the security of AI models, particularly concerning the protection of sensitive information and the prevention of data poisoning attacks [9][10] Collaborative Efforts - The laboratory aims to form alliances through agreements that promote data security and encourage participants to prioritize data safety and privacy [8] - By fostering collaboration among universities and industries, the laboratory seeks to create a virtuous cycle of data sharing and usage, positioning the Greater Bay Area as a model for data security practices [8][9]
纯私有化部署+AI加持 政企专属的360智语视频会议智能体来了!
Sou Hu Cai Jing· 2025-09-15 11:56
开会总是漏掉重点?整理会议纪要耗费太多精力?……面对传统会议存在"信息遗漏、效率低下、安全 隐患"三大痛点,360智语视频会议智能体应运而生。 这款智能体应用紧扣党政军、央国企的会议需求,不仅从实时转录到智能纪要一气呵成,更专为内网环 境设计、支持全私有化部署,满足重要内部会议智能化和安全性的双重需求。 私有化部署 严格守好视频会议"安全门" 在AI的狂飙突进中,确保信息和数据安全、可控,对于大型政企来说,是道不可逾越的"生命线"。特别 是打破时空限制的视频会议,随着AI元素的加入,潜在的安全风险也愈发凸显。 360智语智能会议纪要功能 "和线下会议相比,视频会议可谓危机重重。"近期,公安部网安局在"护网2025"行动中特别提醒,需严 守视频会议"安全门"。若防范不力,轻则导致会议内容被恶意下载,重则可能成为窃密跳板,给组织带 来难以估量的严重后果。 公安部网安局发布视频会议安全提醒 作为专注服务党政军、央国企的智能协作平台,360智语的视频会议智能体支持本地化部署,充分满足 数据安全、隐私保护和合规性需求,彻底规避公有云数据泄露风险;采用端到端加密传输,从网络传 输、数据加密到存储管理实现全链路防护,严防窃 ...
郭润清:加速建设国家级汽车行业数据跨境创新中心
Yang Shi Wang· 2025-09-15 10:53
Core Viewpoint - The automotive industry is increasingly reliant on global data for vehicle development and competitiveness, necessitating the establishment of a national-level cross-border data innovation center to support the globalization of the industry [1][3]. Group 1: Globalization and Data Utilization - The scale of China's automotive exports is rising, with a shift from simple product exports to localized ecosystems and R&D, making cross-border data a critical factor for sustained competitive advantage [3]. - Data has transitioned from a backend cost to a front-end competitive asset, serving as a prerequisite for global competition and a core accelerator for automotive enterprises [3]. Group 2: Regulatory Framework and Compliance - A comprehensive regulatory framework for cross-border data, including laws, regulations, and standards, has been established in China, particularly concerning personal information and critical data in the automotive sector [4]. - The upcoming "Automotive Data Export Safety Guidelines (2025 Edition)" aims to clarify cross-border data requirements, with a focus on scenarios like software upgrades and automated driving [4]. Group 3: Impact of Data on Business Operations - The ability to comply with cross-border data regulations determines the extent of a company's global market access, directly impacting its growth potential [5]. - The efficiency of cross-border data flow influences the speed of innovation, making data a key element in R&D and global competitiveness [5]. - High-value data applications are reshaping operational models and becoming crucial for brand pricing strategies [5]. - Data security is essential for building brand trust and constitutes a core component of intangible assets [5].