Workflow
数据安全
icon
Search documents
TikTok设立美国合资公司 甲骨文负责安全主导
Xin Lang Cai Jing· 2026-01-28 16:26
Core Insights - Oracle (ORCL) shares fell by 0.5% in early trading on Wednesday as the company joined a newly established TikTok U.S. data security joint venture as a managing investor and security partner [1] Group 1 - The joint venture aims to ensure the security of U.S. user data and algorithms [1] - The application will continue to serve approximately 200 million U.S. users [1]
绿盟科技:网络安全2026年
Lv Meng Ke Ji· 2026-01-28 13:55
Investment Rating - The report does not explicitly state an investment rating for the cybersecurity industry. Core Insights - The report emphasizes the importance of cybersecurity in the context of national security and economic resilience, highlighting the strategic and tactical frameworks for development in the upcoming five years [15][17]. - It outlines the rapid growth of regulatory frameworks in data management and cybersecurity, particularly in China, indicating a shift from theoretical frameworks to practical management systems [18][20]. - The report identifies key areas of focus within cybersecurity, including network security, data security, personal information protection, and the integration of artificial intelligence in security measures [19][27]. Summary by Sections 1. Macro Observations - The "14th Five-Year Plan" outlines goals for cybersecurity development, emphasizing risk prevention and economic resilience [15]. - The report discusses the strategic importance of self-reliance in technology, particularly in critical areas like integrated circuits and software [15][16]. - It highlights the establishment of a comprehensive security system, including legal, strategic, and policy frameworks [16][17]. 2. Domestic Cybersecurity Policy Development - The report notes a significant increase in the number of cybersecurity regulations, particularly in data management, reflecting a growing focus on data rights and compliance [18][19]. - It categorizes key areas of cybersecurity policy, including network security, data security, and personal information protection, with specific industry implications [19][20]. 3. Key Policy Regulations Analysis - The report analyzes various regulatory documents, such as the "Data Outbound Security Assessment Application Guide," which streamlines the process for data handlers [27][28]. - It discusses the "Personal Information Outbound Certification Measures," which set forth requirements for the outbound transfer of personal data, enhancing compliance and protection [35][36]. - The "National Data Infrastructure Construction Guidelines" emphasize the importance of data flow and security infrastructure, outlining a phased approach to development [45][46]. 4. Technological Developments - The report highlights the role of AI in enhancing cybersecurity measures, including automated threat detection and response systems [50][51]. - It discusses the testing of AI applications in cybersecurity, indicating a shift towards more dynamic and responsive security solutions [50][51]. 5. U.S. Cybersecurity Policy Analysis - The report reviews the U.S. cybersecurity regulatory landscape, noting the release of 107 new policies in 2025, with a focus on network security and data protection [54][55]. - It highlights significant changes in U.S. policy under the Trump administration, particularly regarding AI and cybersecurity funding [59][63]. - The report discusses the introduction of tools to enhance software supply chain security, reflecting a growing emphasis on managing supply chain risks [66][67].
公司是如何监控员工的
3 6 Ke· 2026-01-28 09:13
Core Viewpoint - The article discusses the pervasive monitoring systems in workplaces, highlighting how companies track employee behavior and intentions, particularly regarding potential resignations and data security [1][15][26]. Group 1: Monitoring Systems - Companies utilize various monitoring systems, including DLP (Data Loss Prevention) and employee behavior management systems, to assess employee risk levels regarding resignation [2][5]. - Monitoring focuses on high-priority data such as company files, sensitive operations, and employee screen activities, although not all features are activated due to cost considerations [2][10]. - Monitoring data is used for daily rule enforcement and post-incident investigations, allowing companies to respond to potential data breaches or employee misconduct [5][6]. Group 2: Types of Monitoring - Monitoring methods can be categorized into software and hardware, with software capable of tracking file operations, screen activities, and even communications through third-party applications [10][11]. - Hardware monitoring includes network management gateways and surveillance cameras equipped with machine learning for employee behavior analysis [12][14]. - Companies can configure monitoring systems to track specific information based on employee roles, with stricter measures in high-risk industries like finance and technology [14][15]. Group 3: Purpose of Monitoring - The primary goal of monitoring is to protect company assets, prevent data theft, and manage employee efficiency, with some companies also using it for public relations risk management [15][27]. - Monitoring can deter employees from misconduct by increasing the cost of data theft, such as implementing invisible watermarks on sensitive documents [16][27]. - While monitoring is often justified as a means to enhance productivity, it can also lead to over-surveillance, which may not be necessary if employees meet performance expectations [27]. Group 4: Employee Awareness and Reactions - Employees are generally aware of monitoring but may not fully understand its extent, leading to self-regulation in their behavior [18][21]. - Some employees may engage in counter-monitoring tactics, such as using virtual machines or altering their behavior to avoid detection [24][25]. - The article emphasizes the importance of maintaining a separation between personal and work-related activities to protect privacy while using company resources [25]. Group 5: Legal and Ethical Considerations - The legal framework surrounding employee monitoring is still developing, with a lack of clear guidelines on what data can be collected and how it can be used [26][27]. - Ethical concerns arise when monitoring extends into personal devices or private information, which can lead to legal disputes [23][26]. - Trust between employers and employees is crucial for effective monitoring; without it, even the most advanced systems may fail to ensure security and efficiency [29].
H-1B visa freeze in Texas: Governor Greg Abbott says ‘Texans come first’ in local employment push; bans Chinese firms
MINT· 2026-01-28 02:16
H-1B Visa Freeze - Texas Governor Greg Abbott has ordered a freeze on new H-1B visa petitions for state agencies and universities, emphasizing that jobs should be allocated to qualified Texans instead of immigrants [1][2] - The decision is based on reports of abuse in the federal H-1B visa program and aims to ensure that American jobs are prioritized for American workers [2][3] - State agencies and public institutions must obtain written permission from the Texas Workforce Commission to petition for new H-1B workers [4] Reporting Requirements - Agencies and universities are required to report by March on the number of new H-1B petitions and renewal requests submitted last year, as well as the number of H-1B visa holders they currently sponsor [5] Impact on Employment - The private sector employs the majority of H-1B visa holders, with Cognizant Technology Solutions, Infosys, and Oracle being the top three employers [6] - Abbott's order is expected to significantly impact public universities and hospitals, which employ hundreds of H-1B workers [7] Ban on China-linked Companies - In addition to the H-1B visa freeze, Abbott announced a ban on China-linked tech companies from state systems to prevent data harvesting and exploitation of state systems [8] - The ban targets 26 Chinese or China-linked companies, including Alibaba and Shein, to protect the privacy and security of Texans [9] - The restrictions were expanded following a threat assessment by the Texas Cyber Command [10]
TikTok美国合资公司,新CEO是他
财富FORTUNE· 2026-01-27 13:05
亚当·普雷瑟( Adam Presser )是 TikTok 美国合资企业新任首席执行官。图片来源: Jon Kopaloff—Getty Images for TikTok 哈佛双学位毕业生亚当·普雷瑟将执掌TikTok新成立的美国合资企业,他计划借这家中国企业应对美 国监管调整的发展契机,推动公司实现长期成功。 根据其领英资料,2022年4月至2023年7月期间,他曾任TikTok首席执行官周受资的首席幕僚,之后 逐步晋升为运营主管,最终出任TikTok运营与信任安全负责人。这位驻洛杉矶的高管如今面临科技 界最具政治敏感性的挑战之一:掌舵TikTok新成立的美国实体,既要打消美国政府的监管顾虑,又 要留住用户。 TikTok未立即回应《财富》杂志置评请求。 不过,凭借顶尖的教育背景和近20年的企业从业经历,普雷瑟或已为应对这一挑战做好充分准备。 他高中就读于私立名校哈佛西湖中学,随后进入耶鲁大学深造,获得汉语言文学学士学位及东亚研 究硕士学位。在耶鲁求学期间,普雷瑟获得理查德·莱特奖学金,赴中国进行汉语研修。 他在2023年接受洛杉矶约翰·托马斯·戴伊学校(升入哈佛西湖中学前就读的学校)校友访谈时透 露, ...
启明星辰:公司主营业务为网络安全产品、安全运营服务及解决方案
Zheng Quan Ri Bao Wang· 2026-01-27 10:15
Core Viewpoint - The company, Qiming Star (启明星辰), focuses on cybersecurity products, security operation services, and solutions, emphasizing areas such as AI+security, data security, cloud security, and basic network information security [1] Group 1 - The company's main business includes cybersecurity products and services [1] - The company has disclosed its operational status in regular reports, indicating no undisclosed significant matters [1]
《网络安全2026:启航“十五五”》报告展望安全风险和技术方向
Core Viewpoint - The report emphasizes the critical role of cybersecurity as a core support for high-quality development during the "14th Five-Year Plan" period, highlighting the integration of key research findings by Green Alliance Technology and China Unicom [1] Group 1: Cybersecurity Risks - The report identifies five key areas where cybersecurity risks are prominent, including the evolution of APT attacks, significant changes in high-risk host situations, continuous expansion of exposed network assets, persistent threats from dark web data trading, and rising security threats associated with IPv6 [1] Group 2: Technological Directions - The report outlines nine representative technological directions that will shape the industry landscape by 2026, which include resilient security, AI-enabled cybersecurity, AI self-security, trusted data spaces, API security, cloud computing security, supply chain security, blue team development, and security for the Internet of Things [1]
全国首批、行业首家!平安好医生(01833)获中央网信办个人信息保护认证
智通财经网· 2026-01-27 09:03
Core Viewpoint - Ping An Good Doctor has become the first company in the medical health industry to obtain the national personal information protection certification, indicating its leading capability in user data protection and laying a solid foundation for its development in medical insurance collaboration and corporate health management [1][2]. Group 1: Certification and Standards - The personal information protection certification is a national standard certification system jointly promoted by the State Administration for Market Regulation and the National Internet Information Office since 2022, aimed at regulating personal information processing activities and enhancing data security [2]. - After a rigorous review covering over 140 certification standards, Ping An Good Doctor's personal information protection capabilities were confirmed to fully comply with the national standard GB/T 35273-2020 [2]. Group 2: Commitment to Data Security - As a pioneer in the internet medical field, Ping An Good Doctor views user data security as vital to its business development, given the sensitivity of medical health data and its impact on public trust and industry reputation [2]. - The company has received multiple authoritative certifications in data security, including ISO 27001, ISO 27701, and ISO 27799, ensuring effective protection of data security and user privacy across all business areas [3]. Group 3: Future Directions - Moving forward, with the integration of medical insurance and commercial insurance and the rapid development of medical AI, Ping An Good Doctor will continue to prioritize data security and personal information protection, enhancing its ESG development philosophy [4]. - The company aims to provide high-quality, efficient, and reliable medical health and elderly care services while contributing to the compliance, safety, and sustainable development of the medical health industry [4].
耐克:正在调查可能的数据泄露事件
Xin Lang Cai Jing· 2026-01-26 17:13
Core Viewpoint - Nike is investigating a potential data breach, with a notorious hacking group claiming to have leaked a significant amount of operational data [2][5]. Group 1: Data Breach Details - The hacking group "World Leak" claims to have published 1.4TB of Nike's data [2][5]. - Nike has stated that it values consumer privacy and data security, and is actively assessing the situation [2][5]. - Nike has not commented on specific details of the investigation or whether a ransom has been paid [2][5]. Group 2: Business Context - Nike's business has been struggling, losing market share to smaller competitors, and is attempting to regain its position as a leading sports apparel brand [2][5]. - As of Monday morning, Nike's stock price remained stable [5]. - It is currently unclear if the data breach has affected Nike's major wholesale partners, such as Dick's Sporting Goods, Macy's, and JD Sports [6]. Group 3: Industry Impact - Data breaches have caused significant disruptions in the corporate sector, with companies like MGM Resorts, Clorox, and UnitedHealth experiencing major attacks in 2023 and 2024 [6]. - The MGM attack resulted in losses of at least $100 million, while Clorox saw a decline of over $350 million in quarterly net sales [6].
美国财政部终止与博思艾伦咨询公司的全部合同
Xin Lang Cai Jing· 2026-01-26 16:00
美国财政部于周一宣布,已终止与博思艾伦咨询公司签订的 31 份总价值 2100 万美元的合同,并指控该 公司未能妥善保护敏感数据,涉及美国国税局的相关信息也包含在内。 美国财政部长斯科特・贝森特在周一发布的一份声明中表示:"博思艾伦咨询公司未能落实充分的防护 措施以保障敏感数据安全,其中包括其通过与美国国税局签订的合同获取的纳税人保密信息。" 博思艾伦咨询公司前承包商查尔斯・利特尔约翰于 2024 年承认,曾向新闻媒体泄露美国国税局掌握的 特朗普总统及其他人士的税务信息,他最终被判处五年监禁。 美国财政部发布的公告显示,美国国税局经核查认定,此次数据泄露事件波及超过 40 万名纳税人。 责任编辑:郭明煜 美国财政部于周一宣布,已终止与博思艾伦咨询公司签订的 31 份总价值 2100 万美元的合同,并指控该 公司未能妥善保护敏感数据,涉及美国国税局的相关信息也包含在内。 美国财政部长斯科特・贝森特在周一发布的一份声明中表示:"博思艾伦咨询公司未能落实充分的防护 措施以保障敏感数据安全,其中包括其通过与美国国税局签订的合同获取的纳税人保密信息。" 博思艾伦咨询公司前承包商查尔斯・利特尔约翰于 2024 年承认,曾 ...