Workflow
内生安全体系
icon
Search documents
齐向东:聚焦“三个认识”解析网络安全变局
Yang Zi Wan Bao Wang· 2026-01-30 13:33
Core Insights - The speech by Qi Xiangdong emphasizes the need for enhanced understanding of vulnerabilities, attackers, and losses to effectively address new threats during the 14th Five-Year Plan period [1][2] Group 1: Understanding Vulnerabilities - The core of cybersecurity issues lies in vulnerabilities, which can be categorized into six types: software, hardware, machine, human, system, and operational vulnerabilities [1] - Machine vulnerabilities are particularly concerning as they can proliferate with extended scenarios, such as vulnerabilities in drone management systems that could lead to significant public safety incidents [1] - An analysis by Qi Anxin revealed that 93.3% of major domestic automotive manufacturers' cloud platforms have security vulnerabilities, with 76.7% of these being classified as critical or high-risk [1] Group 2: Understanding Attackers - Current attackers include cyber armies, government intelligence agencies, gray market organizations, and individual hackers deeply embedded in attack chains [2] Group 3: Understanding Losses - The urgency of recognizing losses from cyberattacks is highlighted, with examples including military-grade losses from power outages due to cyberattacks, and significant financial impacts on companies from ransomware and data breaches [2] - The economic impact of cybersecurity incidents is substantial, with examples such as the loss of billions in market value due to compromised training models and ransomware extracting billions in ransom annually [2] Group 4: Strategic Recommendations - The primary task for cybersecurity upgrades during the 14th Five-Year Plan is to abandon outdated security perceptions and to build a robust defense system supported by four platforms and five red lines [2]
StackWarp漏洞危机愈演愈烈背后:海光C86在X86生态中走出独立安全路线
经济观察报· 2026-01-23 11:44
Core Viewpoint - The independent evolution of the Haiguang C86 architecture provides a secure, controllable, and efficient choice for China's digital infrastructure construction, especially in the context of computing power becoming a fundamental infrastructure [1][38]. Group 1: StackWarp Vulnerability and Its Implications - The StackWarp vulnerability discovered in AMD's Zen series processors exposes a significant flaw in cloud computing's isolation capabilities, allowing attackers to modify running programs and data [2][3]. - The response from AMD to disable simultaneous multithreading (SMT) to mitigate the vulnerability results in a substantial reduction in processing power, halving the server's capacity to support virtual service instances [3][4]. - In contrast, Haiguang's C86 processors are inherently immune to the StackWarp vulnerability due to their architectural design, allowing users to maintain full computational performance without needing firmware upgrades or disabling features [4][10]. Group 2: Technical Differentiation - Haiguang's ability to defend against the StackWarp vulnerability stems from its fundamentally different virtualization technology compared to AMD, utilizing self-developed CSV3 technology to create a new defense mechanism [6][12]. - The C86 architecture has decoupled from the x86 technology route, replacing AMD's platform security processor (PSP) with Haiguang's self-developed security processor (HSC) [12][15]. - The C86 processor integrates a general-purpose C86 core and a dedicated security processor, ensuring a secure boot process and a chain of verification that maintains system integrity from the first line of code [13][14]. Group 3: Three-Layer Security System - Haiguang's C86 architecture features a three-layer security system: native cryptographic technology, proactive trusted computing, and isolated confidential computing [17][18]. - The first layer involves integrating a cryptographic co-processor (CCP) within the processor, allowing for high-speed encryption without the performance penalties associated with traditional software or external hardware solutions [20][21]. - The second layer, proactive trusted computing, extends security measures from system startup to runtime, utilizing TDM technology to continuously monitor and verify the integrity of critical system components [24][25]. - The third layer, isolated confidential computing, employs CSV technology to ensure real-time memory encryption for virtual machines, preventing unauthorized access and data leaks in cloud environments [28][29]. Group 4: Market Position and Applications - Haiguang's C86 architecture has been widely adopted in high-security scenarios, particularly in finance, telecommunications, and energy sectors, achieving a 50% share in trusted computing certified products [27][36]. - The architecture maintains full compatibility with the x86 ecosystem, allowing applications originally designed for Intel or AMD servers to migrate seamlessly to Haiguang platforms without code modifications [37]. - The independent evolution of Haiguang's technology mitigates risks associated with reliance on external architectures, ensuring stable performance and security in the face of global hardware vulnerabilities [38].
2025BCS大会开幕,齐向东:“万家造”和“两张皮”催生数据孤岛
Chang Sha Wan Bao· 2025-06-09 15:32
Core Insights - The importance of data for security has increased exponentially over the past decade, but the lack of a unified system has led to the creation of "data islands," severely hindering the implementation of security systems [3][4] - The phenomenon of "two skins" in business and security is prevalent, where security departments are not synchronized with business operations, leading to vulnerabilities and data breaches [4] Group 1: Data Isolation Issues - Many enterprises face challenges in implementing network security systems, with the data island problem being particularly prominent due to the fragmented nature of security devices and operations [3] - A case study of a leading financial institution revealed that the deployment of multiple firewall models from various brands resulted in inconsistent data formats and incompatible interfaces, complicating data collection and analysis [3] Group 2: Operational Challenges - The "manufactured by many" situation in security equipment was highlighted during the recent India-Pakistan conflict, where India's diverse equipment failed to perform effectively due to lack of standardization and poor data flow, contrasting with Pakistan's more integrated system [3] - Insufficient security investment and compatibility issues between new and old products are significant barriers to the effectiveness of overall security system construction [4]
齐向东:重塑内生安全体系 实现安全突围
Jing Ji Wang· 2025-06-09 10:06
Core Insights - The 2025 Global Digital Economy Conference emphasizes the importance of a systematic approach to cybersecurity, with the theme "Breaking Through Security: Reshaping the Endogenous Security System" [1] - Qi Xiangdong, a key speaker, highlights that the current cybersecurity industry is at a critical juncture where systematic construction is essential for overcoming existing challenges [1] Group 1: Current Challenges in Cybersecurity - The cybersecurity industry is facing three major dilemmas: ineffective implementation of systematic thinking, integration bottlenecks between large and small systems, and operational obstacles within small systems [2] - Over 90% of large government and enterprise institutions purchase security equipment from more than 10 vendors, leading to a fragmented "big platter" state in cybersecurity [2] - The lack of integration between large and small systems results in disjointed security capabilities and difficulties in unified strategic implementation [2] Group 2: Barriers to Effective Security Systems - Qi identifies three significant barriers to achieving the emergent effect in endogenous security systems: data silos, insufficient investment, and compatibility issues between old and new systems [2] - Data silos continue to hinder the implementation of security systems, despite the increasing importance of data in security over the past decade [2] - The phenomenon of "many manufacturers" and "two skins" contributes to data fragmentation, making it difficult for organizations to recognize external attacks [3] Group 3: Pathways for Systematic Construction - Systematic construction in cybersecurity requires adopting a system integration mindset, applying systematic thinking to the development of security protection frameworks [3] - Qi proposes three pathways for reshaping the security industry: reconfiguring data aggregation models, enhancing security operation models, and fostering ecological cooperation models [3]
专家热议AI时代网络安全:重塑内生安全体系是“突围之钥”
Huan Qiu Wang· 2025-06-06 08:22
Core Insights - The 2025 Global Digital Economy Conference highlighted the theme "Breaking Through Security: Reshaping the Endogenous Security System," focusing on the challenges in cybersecurity during the AI era [1][3] Group 1: AI and Cybersecurity Challenges - AI presents both opportunities and systemic challenges for the cybersecurity industry, necessitating a breakthrough in current security frameworks [3] - The complexity of the international situation and the rapid proliferation of AI applications have rendered traditional security measures ineffective [3] - The Chinese government has initiated regulatory measures, including the "Interim Measures for the Management of Generative AI Services," with over 400 large models registered as of now [3][4] Group 2: Systemic Solutions and Recommendations - Experts emphasize the need for a systematic approach to address the multifaceted risks posed by AI in cybersecurity [4] - Recommendations include accelerating the construction of AI-enabled security systems, promoting innovation in AI security products, and enhancing protective measures through practical applications [4][5] - Key obstacles to building an endogenous security system include data silos, insufficient resource investment, and compatibility issues between old and new systems [5] Group 3: International Expansion and Collaboration - Companies like Qi Anxin are focusing on international business growth, aiming for a significant proportion of their operations to be overseas in the next decade [5][6] - The Chinese cybersecurity industry is positioned to compete globally, with innovations and product quality comparable to developed countries [6] - The collaborative ecosystem is deemed essential for overcoming challenges in core technology development and industry cooperation [6]
齐向东:数据孤岛严重阻碍网络安全体系落地
Core Insights - The 2025 Global Digital Economy Conference highlighted the challenges faced by enterprises in implementing cybersecurity systems, particularly the issue of data silos [1][2] - Qi Anxin's chairman emphasized the exponential growth of data importance in security over the past decade, which has led to fragmented systems and isolated data [1] - The lack of a unified system has resulted in difficulties in data management and response capabilities within security operations centers [1] Group 1: Data Silos - The phenomenon of data silos is primarily caused by the "thousand manufacturers" situation of security devices, leading to inconsistent data formats and incompatible interfaces [1] - A case study of a leading financial institution revealed that the deployment of multiple firewall models from various brands resulted in chaotic data collection and analysis [1] - The fragmented nature of security data hampers comprehensive situational awareness and rapid response to incidents [1] Group 2: Business and Security Disconnection - The "two skins" phenomenon, where business operations and security measures are not aligned, was illustrated by an incident involving a financial data breach due to delayed communication between departments [2] - Insufficient investment in security and compatibility issues between new and old products are significant barriers to effective cybersecurity system construction [2] - Addressing these challenges requires a holistic approach to internal security systems, emphasizing the need for strategic thinking in overcoming obstacles [2]
齐向东:当前网络安全体系建设面临三重困境,呼吁重塑内生安全体系
Jing Ji Guan Cha Bao· 2025-06-05 09:26
Group 1 - The core theme of the conference is "Security Breakthrough: Reshaping the Internal Security System," focusing on the challenges and opportunities in the cybersecurity industry during the transition from the 14th to the 15th Five-Year Plan [2] - The chairman of Qi Anxin Group highlighted three major dilemmas facing the current cybersecurity system: the ineffective implementation of systematic thinking, the bottleneck in integrating large and small systems, and operational obstacles within small systems [3][4] Group 2 - The first dilemma is the ineffective implementation of systematic thinking, where over 90% of large government and enterprise institutions procure equipment from more than 10 vendors, leading to a fragmented security system [3] - The second dilemma involves the integration gap between macro-level security designs and micro-level industry-specific security systems, which can create vulnerabilities [3] - The third dilemma is the operational hindrances within small systems due to inconsistent standards and lack of data sharing, which exacerbates capability disparities [3] Group 3 - The issue of insufficient security investment is particularly pronounced in the AI era, with a large energy company investing over 1 billion yuan annually in digital transformation but allocating less than 4% to cybersecurity [4] - The chairman emphasized the need for a shift from "selecting individual products" to "systematic selection" and from "fragmented design" to "systematic design" to effectively address current complex threats [4] - The cybersecurity industry must promote rational security investment, unify standards, and enhance the integration of large and small systems through policy guidance, technological innovation, and industry collaboration [5]