Workflow
数据安全
icon
Search documents
“广东通信杯”第五届网络安全技能大赛在深圳落幕
Sou Hu Cai Jing· 2025-09-07 13:15
Group 1 - The "Guangdong Communication Cup" cybersecurity skills competition concluded successfully in Shenzhen, focusing on data security and digital application technology [1][3] - The event was co-hosted by multiple government bodies and organizations, emphasizing the importance of cybersecurity in various sectors [3] - The competition featured a theme of "AI forging the network, safeguarding security," addressing current trends in cybersecurity, including AI, data security, and IoT security [3] Group 2 - A total of 185 participants competed in the individual category, while 192 individuals formed 64 teams for the team competition, showcasing a wide range of industry representation [3] - Awards were given to outstanding individuals and teams, with notable achievements from Zhongshan Unicom and Foshan Mobile, highlighting the competitive nature of the event [4] - The event also saw the establishment of new initiatives, such as the "Internet Fraud Prevention Professional Committee" and a "Network and Data Security Joint Laboratory," enhancing cybersecurity efforts in Guangdong [4]
移动金融App开启自律检查,剑指违规使用个人信息!此前已有2664款完成备案
Bei Jing Shang Bao· 2025-09-07 12:06
北京商报讯(记者 廖蒙)备案动作之外,移动金融App再次被要求自查。9月7日,北京商报记者注意到,为持续提升金融领域App自律管理工作水平,切实 防范相关风险,中国互联网金融协会(以下简称"协会")日前发布《关于进一步加强金融领域App自律检查的通知》(以下简称《通知》)。 根据《通知》,本次检查对象为直接开展金融业务的App和为金融业务提供相关服务的App,重点检查发生安全事件、引发严重舆情、投诉高企、应备案未 备案、不遵守自律管理相关要求等情况的App。检查内容包括App网络防护措施不到位、数据安全管理制度不完善、违规使用个人信息等问题,App安全管 理薄弱、涉嫌违法违规开展业务和不遵守自律管理相关要求等问题。 博通咨询首席分析师王蓬博认为,开展自律检查有利于金融行业进行自我规范,在运营中长期违反相关规定的金融类App,必然会在自查中经历淘汰。对于 金融机构而言,在协会敦促下开展自纠自查,能够让机构加强在信息收集方面的规范化操作,以最小必要为前提,减少信息泄露的可能。 近年来,App已成为金融消费者享受金融服务的重要渠道,极大提升了金融服务的可获得性和覆盖范围。这一过程中,部分移动金融App隐私协议内容模 ...
物联网企业出海必须关注的20+数据/网络安全/AI/可持续法规
3 6 Ke· 2025-09-05 13:30
Core Insights - Recent regulations from the EU, US, China, and the UK regarding data governance, ESG disclosure, and cybersecurity have significantly impacted IoT companies, particularly those from China aiming for global expansion [1][3]. Regulatory Overview - Compliance with regulations has become a prerequisite for market entry, with higher demands for data security, device safety certification, and personal privacy protection. Failure to establish compliance mechanisms can lead to hefty fines, sales bans, and loss of access to key markets [1][3]. - New ESG and sustainability regulations are rapidly raising the reputation and trust thresholds for companies, making compliance a competitive advantage in the context of increasing geopolitical regulatory scrutiny [1][3]. Key Regulations to Monitor - The article outlines 20+ critical regulations that IoT companies must pay attention to, categorized into four main areas: data regulations, cybersecurity regulations, artificial intelligence regulations, and sustainability regulations [3][6]. Data Regulations - The EU's General Data Protection Regulation (GDPR) is the global benchmark for personal data protection, imposing strict user rights and severe penalties for non-compliance, including fines up to €20 million or 4% of global revenue [4][5]. - The EU Data Act, effective from September 12, 2025, mandates fair access and sharing of data among businesses and individuals, with penalties for non-compliance [7][8]. Cybersecurity Regulations - The US's Critical Infrastructure Cyber Incident Reporting Act (CIRCIA) requires critical infrastructure entities to report significant cyber incidents within 72 hours, with penalties determined through civil litigation [19]. - The IoT Cybersecurity Improvement Act mandates federal agencies to procure IoT devices that meet specific security standards, with penalties for non-compliance [21][22]. Artificial Intelligence Regulations - The EU's AI Act, effective from August 1, 2024, introduces a comprehensive regulatory framework for AI systems, categorizing risks and imposing strict obligations on high-risk AI applications [35][36]. - China's interim measures for generative AI services emphasize compliance with data training requirements and respect for intellectual property rights [32][34]. Sustainability Regulations - The EU's Corporate Sustainability Reporting Directive (CSRD) requires companies to disclose their environmental impact and sustainability goals, with third-party audits mandated for accuracy [42]. - The Carbon Border Adjustment Mechanism (CBAM) aims to equalize carbon costs for imported high-carbon products, with implementation phases starting from October 2023 [40][41]. Conclusion - The evolving regulatory landscape necessitates that IoT companies proactively adapt to these changes to maintain market access and competitive positioning in a global context [1][3].
温州设立浙江省首个市级人工智能局
Xin Hua She· 2025-09-04 11:52
Group 1 - Wenzhou has established the first municipal-level Artificial Intelligence Bureau in Zhejiang Province, focusing on "AI + data security" and demonstration applications to promote specialized development in AI [1] - The bureau's main responsibilities include formulating and implementing the city's AI development plans and policies, coordinating the construction of related infrastructure such as computing power, data, and algorithms, and leading the "AI +" initiatives [1] - The establishment of the AI Bureau is seen as a new mission for the city's future development strategy, emphasizing collaboration among departments and innovation across government, industry, academia, and investment [1] Group 2 - Over the next three years, Wenzhou plans to build three comprehensive systems: computing power infrastructure, data infrastructure, and full-service AI industry support [2] - The city aims to accelerate the cultivation of four key industries: intelligent computing power and core hardware manufacturing, the full data element chain, large models, intelligent agents, software platforms, and smart terminals [2] - Wenzhou will promote AI applications in 12 sectors, including manufacturing, energy, and healthcare, while implementing 12 supportive policies to lower innovation costs, encourage R&D investment, and support enterprise development [2]
企业即时通讯私有化部署的五大隐藏价值
Sou Hu Cai Jing· 2025-09-04 08:37
Core Insights - The core value of private deployment of enterprise instant messaging lies not only in data security but also in deep customization, management empowerment, ecosystem integration, long-term cost optimization, and compliance assurance, creating a digital collaboration system that is both efficient and resilient Group 1: Deep Customization - Public cloud tools have fixed functionalities that may not meet complex business needs, while private deployment supports modular development and system integration, acting as a "precise adapter" for business scenarios [1] - Industry-specific customization allows sectors like manufacturing to integrate IM with production systems for real-time alerts, and healthcare to develop features that comply with regulations [1] - System integration through API/SDK enables quick connections with OA, CRM, ERP systems, enhancing operational efficiency, as demonstrated by a renewable energy company that improved supply chain response time by 80% [1] Group 2: Management Empowerment - Private deployment shifts enterprise management from "passive defense" to "active governance" through comprehensive risk control mechanisms [4] - Fine-grained permission control supports multi-level organizational structures and detailed access management to prevent internal information leaks [4] - Risk monitoring includes auditing employee chat records and logging critical operations, with capabilities for remote data wipe in emergencies [5] Group 3: Ecosystem Integration - Private deployment acts as a "connector" to break data silos by building a cross-system collaboration network through open API ecosystems [6] - Support for heterogeneous system integration meets domestic policy requirements, allowing compatibility with local operating systems and databases [6] - Third-party application integration averages over 500 applications across various business functions, significantly improving operational response times [6] Group 4: Long-term Cost Optimization - Public cloud IM incurs ongoing costs based on user count and features, which can exceed the one-time investment of private deployment, especially for large enterprises [7] - Private deployment reduces subscription fee accumulation and enhances collaboration efficiency while lowering long-term operational costs, as evidenced by a manufacturing company that eliminated sensitive file leak incidents [7][8] - Dedicated resource allocation allows for tailored bandwidth, storage, and computing resources, avoiding performance fluctuations associated with multi-tenant public cloud environments [9] Group 5: Compliance Assurance - Private deployment meets compliance requirements under laws like the Data Security Law and Personal Information Protection Law by ensuring data localization and traceability [10] - All operations are logged automatically, supporting compliance with standards such as Level 2 Protection and HIPAA, facilitating audits and traceability [10] - Local compliance ensures data storage aligns with regional laws, mitigating risks associated with cross-border data transmission [11]
英方软件跌1.69%,成交额5654.72万元,后市是否有机会?
Xin Lang Cai Jing· 2025-09-04 08:07
Core Viewpoint - The company, Yingfang Software, specializes in data replication software and services, focusing on compatibility with various platforms and contributing to the digital transformation across multiple industries [2][3][7]. Company Overview - Yingfang Software was established on August 12, 2011, and went public on January 19, 2023. The company is located in Shanghai and primarily offers data replication software, integrated hardware-software solutions, and related services [7]. - The revenue composition of the company includes 60.37% from software products, 20.57% from software-related services, 15.97% from integrated hardware-software products, and 3.09% from other sources [7]. Product and Technology - The company has developed proprietary data replication technologies, including dynamic file byte-level replication, database semantic-level replication, and volume block-level replication, which are essential for disaster recovery and data protection [2][3]. - Yingfang Software's products are compatible with various domestic and international software brands, including Huawei's Kunpeng chips and Euler operating system, and have been certified for use with GaussDB and openGauss [2][3]. Market Position - Yingfang Software is recognized as one of the top three suppliers in the domestic data replication and protection software market [3]. - The company's software products are widely used in financial institutions, including securities firms, banks, insurance companies, and asset management companies, as well as in government agencies and healthcare institutions [3]. Financial Performance - For the first half of 2025, Yingfang Software reported a revenue of 84.35 million yuan, representing a year-on-year growth of 0.93%. However, the net profit attributable to the parent company was -9.53 million yuan, showing a significant year-on-year increase of 55.35% in losses [8]. Market Activity - On September 4, the stock price of Yingfang Software decreased by 1.69%, with a trading volume of 56.54 million yuan and a market capitalization of 2.869 billion yuan [1]. - The company has experienced a net outflow of 2.25 million yuan from major investors, indicating a trend of reduced holdings over the past three days [4][5].
【网络安全宣传周】没有网络安全,就没有国家安全!这些网络安全知识要牢记!
天天基金网· 2025-09-03 10:34
Core Viewpoint - The article emphasizes the importance of cybersecurity in the digital age, highlighting the potential risks and the need for a robust legal framework to protect against cyber threats [3][12]. Legal Framework - The "Cybersecurity Law of the People's Republic of China" was enacted on June 1, 2017, as the first comprehensive law regulating cybersecurity management in China [5]. - The "Regulations on the Security Protection of Critical Information Infrastructure" came into effect on September 1, 2021, focusing on the protection of critical information infrastructure [6]. - The "Data Security Law" was passed on June 10, 2021, and is a foundational law in the field of data security [7]. - The "Automotive Data Security Management Regulations (Trial)" were implemented on October 1, 2021, to regulate data processing in the automotive sector [8]. - The "Personal Information Protection Law" took effect on November 1, 2021, aimed at protecting personal information rights [9]. - The "Cybersecurity Review Measures" were revised and came into effect on February 15, 2022, to enhance cybersecurity and data security [10]. - The "Interim Measures for the Management of Generative Artificial Intelligence Services" were enacted on August 15, 2023, to regulate AI services [11]. Critical Information Infrastructure - Critical information infrastructure includes essential sectors such as energy, transportation, water resources, finance, and national defense, where damage could severely impact national security and public interest [15]. - The identification of critical information infrastructure is managed by relevant governmental departments, which develop rules based on industry-specific conditions [16]. Security Incidents - Notable cybersecurity incidents include the 2015 Ukraine power grid attack, the 2016 Dyn DNS attack, and the 2021 Colonial Pipeline ransomware attack, all of which highlight the vulnerabilities in critical infrastructure [19]. Security Measures - The "Regulations on the Security Protection of Critical Information Infrastructure" were published on August 17, 2021, to establish a national security protection system [20]. - The national standard for critical information infrastructure security protection was released on November 7, 2022, and implemented on May 1, 2023, providing guidance for security measures [20]. Data Security - Data is categorized into general, important, and core data levels based on the potential harm caused by unauthorized access or breaches [25]. - Organizations are encouraged to implement data security measures such as backup, encryption, and access control to protect sensitive information [26][28]. Cybercrime Prevention - The article discusses various types of cybercrimes, including phishing attacks and telecom fraud, and emphasizes the need for individuals and organizations to adopt preventive measures [21][30]. - Recommendations include protecting personal information, using official channels for transactions, and verifying requests for financial transactions [30][32]. Collective Responsibility - Cybersecurity is portrayed as a collective responsibility, urging society to work together to strengthen defenses and protect the digital environment [34].
英方软件跌2.56%,成交额6244.86万元,近3日主力净流入-1799.37万
Xin Lang Cai Jing· 2025-09-03 08:12
Core Viewpoint - The company, Yingfang Software, is experiencing a decline in stock price and trading volume, indicating potential challenges in the market despite its advancements in data replication technology and partnerships with major platforms like Huawei [1][4]. Company Overview - Yingfang Software, established on August 12, 2011, and listed on January 19, 2023, specializes in data replication software, integrated hardware-software solutions, and related services [7]. - The company's revenue composition includes 60.37% from software products, 20.57% from software-related services, 15.97% from integrated hardware-software products, and 3.09% from other sources [7]. Product and Technology - The company has developed proprietary data replication technologies, including dynamic file byte-level, database semantic-level, and volume layer block-level replication, which are compatible with various domestic and international software brands [2]. - Yingfang Software's products are primarily deployed on clients' data servers, focusing on disaster recovery and data security, making it one of the top three suppliers in the domestic data replication and protection software market [3]. Market Position and Performance - As of June 30, the company had 6,450 shareholders, a 1.90% increase from the previous period, with an average of 7,154 circulating shares per person, a decrease of 1.86% [8]. - For the first half of 2025, Yingfang Software reported a revenue of 84.35 million yuan, a year-on-year increase of 0.93%, while the net profit attributable to the parent company was -9.53 million yuan, reflecting a 55.35% year-on-year improvement [8]. Industry Context - Yingfang Software operates within the computer software development sector, specifically in horizontal general-purpose software, and is associated with concepts such as Huawei Kunpeng, small-cap stocks, data elements, information security, and the digital economy [8].
专家:部分AI知无不言,成“套话重灾区”|数博会
Core Insights - The application of AI large models has raised significant data security concerns, particularly regarding the phenomenon of "prompt leakage" [1][2] - The complexity of AI systems and their interactions increases the risk of sensitive information being inadvertently exposed during data transmission and processing [1][2] Group 1: AI Large Models and Data Security - AI large models are akin to vast databases containing sensitive information, which can be exposed through unintentional prompts during interactions [1] - Unlike traditional databases, AI models possess reasoning capabilities that make them more susceptible to "prompt leakage" [1] - The risk of "prompt leakage" necessitates a comprehensive examination of the entire interaction system to identify potential security vulnerabilities [1] Group 2: Risks and Mitigation Strategies - The risks associated with "prompt leakage" include personal privacy breaches, loss of corporate competitive advantage, and potential threats to national security [2] - Effective measures must be implemented to prevent "prompt leakage," including monitoring interaction processes and analyzing response content [2] - The emergence of new technologies like Model Context Protocol (MCP) introduces additional complexities and security risks, highlighting the critical need for data security in AI applications [2]
贵州大数据集团于数博会期间与联通、华为、360、人民网等签约
Ge Long Hui A P P· 2025-09-02 08:44
Core Insights - Guizhou Big Data Group signed seven strategic cooperation agreements during the 2025 China International Big Data Industry Expo, focusing on various sectors including cloud computing, artificial intelligence, and data security [1] Group 1: Strategic Partnerships - Guizhou Big Data Group partnered with Guizhou Mobile to collaborate on smart computing, big data, cloud services, and new infrastructure projects, aiming to create replicable benchmark demonstration projects [1] - A strategic agreement was signed with Sangfor Technologies to focus on cloud services, network and data security, and artificial intelligence, aiming to build a comprehensive big data industry ecosystem [1] - A partnership with 360 Digital Security Group was established to develop specialized technologies and products in government and enterprise network data security and artificial intelligence [1] - Guizhou Big Data Group signed a comprehensive strategic cooperation agreement with Huawei to deepen collaboration in cloud computing, big data, and artificial intelligence [1] - A strategic agreement with Guizhou Unicom was signed to promote innovation in healthcare, cloud computing, low-altitude economy, industrial internet, and IoT [1] - A memorandum of strategic cooperation was signed with People’s Daily to enhance collaboration in the big data sector [1] - A strategic cooperation agreement with Boyan Technology was established to focus on AI applications, digital transformation services, and public data utilization [1]