Workflow
零信任
icon
Search documents
高盛闭门会-人工智能时代下重新审视网络安全领域的护城河
Goldman Sachs· 2026-03-01 17:22
职业起点为工程师,毕业于麻省理工学院,获得本科及计算机科学硕士学位。 早期在思科参与宽带业务拓展,22 岁时所在团队将该业务打造为思科增长最快、 从 0 到 10 亿美元营收规模的业务,并在该阶段首次系统接触网络安全并萌生 创业方向。其后加入 WestPeck and Grier Venture Partners,并于 2000 年团队独立创立光速创投(LightSpeed Venture Partners),在该机构任职 十多年并担任全球投资委员会六位董事总经理之一。2011 年创办 Auction.com,聚焦房地产在线交易,围绕降低购房这一重大投资决策的风险, 推动业务扩张至年在线销售额 90 亿美元,并曾担任该业务总裁。之后创办 StoneBridge,主要投资网络安全领域,所投公司包括 Kato、Netscout、Abnormal 等。2021 年创立 Ballistic Ventures,专注美 网络安全领域的核心转向更强的主动性,更快发现漏洞并闭环修复,同 时确保修复不会引入新的系统性问题,预防性安全与运行时防护成为关 键。 AI 已成为新增攻击面,全球 GDP 对数字基础设施的依赖提升,网络安 ...
Leidos(LDOS) - 2025 Q4 - Earnings Call Transcript
2026-02-17 14:02
Leidos (NYSE:LDOS) Q4 2025 Earnings call February 17, 2026 08:00 AM ET Company ParticipantsChris Cage - EVP and CFOColin Canfield - DirectorGavin Parsons - Director or Aerospace and Defense Equity ResearchKen Herbert - Managing DirectorScott Mikus - DirectorSeth Seifman - Executive DirectorStuart Davis - VP of Investor RelationsThomas Bell - CEOTobey Sommer - Managing DirectorConference Call ParticipantsGautam Khanna - AnalystGreg Konrad - AnalystJohn Godden - AnalystJonathan Siegman - AnalystOperatorBe adv ...
OpenClaw们狂奔,谁来焊死安全车门?
量子位· 2026-02-02 05:58
Core Viewpoint - The article emphasizes the transition of AI from a capability-first approach to a trust-first paradigm, highlighting the importance of security in the development and deployment of intelligent agents [4][50]. Group 1: Intelligent Agent Security Framework - The intelligent agent security framework proposed by Tongfudun consists of three layers: foundational, model, and application layers, which are essential for ensuring the safety and reliability of AI systems [11][14]. - The foundational layer focuses on computational and data security, ensuring the integrity of the AI's "body" and the purity of its data [12]. - The model layer emphasizes algorithm and protocol security, providing the AI's "mind" with verifiable rationality and aligned values [12]. - The application layer involves operational security and business risk control, applying dynamic constraints and evaluation mechanisms to the AI's real-world actions [12]. Group 2: Node-based Deployment and Data Containers - Node-based deployment offers a resilient infrastructure paradigm by decentralizing computational power into independent, trusted execution environments, thus mitigating single points of failure [16][17]. - Data containers serve as the core vehicle for data sovereignty and privacy, integrating dynamic access control and privacy computing capabilities to ensure data remains "available but invisible" during processing [21][23]. - The combination of nodes and data containers aims to create a scalable collaborative network of intelligent agents, enhancing their autonomy and security boundaries [25][27]. Group 3: Formal Verification and Algorithm Security - The concept of "superalignment" aims to ensure that AI's goals and behaviors align with human values, with a focus on model and algorithm security [29]. - Formal verification is being integrated into the algorithm security framework to mathematically prove that the AI's decision-making logic adheres to defined safety requirements [34][38]. - This approach addresses the inherent unpredictability of AI behavior by establishing clear, provable safety boundaries, thus enhancing the overall security of intelligent systems [36]. Group 4: Application Layer Security Challenges - The rise of "action-oriented" intelligent agents, such as OpenClaw and Moltbook, signifies a shift towards autonomous execution, which introduces new security threats that traditional protective measures cannot address [41][43]. - The security risks include the potential for agents to be manipulated into unauthorized actions through prompt injections, highlighting the need for advanced risk control paradigms [44][45]. - Tongfudun's ontology-based security risk control platform transforms domain knowledge into a machine-understandable semantic map, enabling real-time risk assessment and compliance verification [45][48]. Group 5: Trust as a Foundation for AI Development - The transition from a capability-first to a trust-first mindset is crucial for the sustainable development of AI, particularly as intelligent agents become central to human-machine interactions [50][51]. - The establishment of a "trust infrastructure" for the digital world is essential for unlocking the potential of the intelligent agent economy, comparable to foundational technologies like TCP/IP and encryption in the early internet [51]. - Companies leading in this security domain will not only mitigate risks but also define the next generation of human-machine collaboration rules and build trustworthy commercial ecosystems [54].
喜讯!平安壹钱包荣获上海2025网络安全“磐石行动”卓越应急奖
Sou Hu Wang· 2025-12-11 14:35
Group 1 - The "Panshi Action" network security practical offensive and defensive activity has been successfully held for five years, with this year's event introducing a new competition format and focusing on three key areas: AI security, ransomware prevention, and phishing prevention [3] - The event gathered 58 top attacking teams and 187 defending teams, with nearly 4,000 participants [3] - Ping An Yibao demonstrated exceptional emergency response capabilities during the practical defense exercise, successfully tracing the real identity of attackers and efficiently handling attack incidents, earning the "Outstanding Emergency Award" [3] Group 2 - Ping An Yibao is a comprehensive service platform under Ping An Group, providing digital services across various fields including financial payments, points rights, public consumption, shopping, and employee benefits [5] - In recent years, high-quality information security defense has become one of Ping An's digital competitive advantages, with continuous investment in technology to enhance security management and ensure the safety of financial services for millions of customers [6] - The company has established an information security committee to promote reforms from top to bottom, actively exploring cutting-edge fields such as AI, zero trust, and cloud-native technologies, while also focusing on training technical talent [6]
内地供需回落导致行业利润增速分化:环球市场动态2025年11月28日
citic securities· 2025-11-28 03:03
Market Overview - China's industrial enterprises' profits fell by 5.5% year-on-year in October, a decline of 27.1 percentage points from the previous month, with revenue down by 4%[4] - The profit margin for industrial enterprises decreased due to insufficient demand, with notable divergence in profit growth across industries[4] Global Market Trends - Major European indices showed slight increases, with the Stoxx 600 up by 0.14% and the DAX rising by 0.18%, driven by optimism regarding potential interest rate cuts by the Federal Reserve[7] - The U.S. stock market was closed for Thanksgiving, leading to subdued trading activity in the bond market[3] Stock Performance - In Hong Kong, the Hang Seng Index rose marginally by 0.07%, while the Hang Seng Tech Index fell by 0.36%, reflecting mixed performance among major tech stocks[9] - A-share market saw the Shanghai Composite Index increase by 0.29%, with a total market turnover of 1.72 trillion yuan[13] Commodity and Forex Insights - The dollar index decreased by 0.1%, while the euro appreciated by 12% year-to-date against the dollar[23] - Brent crude oil prices rose by 0.33% to $63.34 per barrel, amid expectations that OPEC+ will maintain production targets[24] Fixed Income Market - The Chinese investment-grade bond market lagged, with spreads widening by 1-3 basis points, reflecting concerns over the performance of real estate companies[26] - U.S. Treasury yields remained stable, with the 10-year yield at 3.99%[25]
连续入选!腾讯云列入Forrester终端管理平台全景报告代表厂商
Sou Hu Cai Jing· 2025-10-20 06:53
Core Insights - Forrester's report "Endpoint Management Platforms Landscape, Q3 2025" includes Tencent Cloud's zero-trust iOA for the second consecutive year, highlighting its significance in the endpoint management sector [1][4]. Group 1: Definition and Demand - Endpoint management platforms are defined as tools that help EUC professionals manage and protect a variety of endpoint devices and operating systems to support employee activities regardless of location [4]. - The demand for endpoint management platforms is driven by cost pressures, skill shortages, evolving work environments, and increasing threats [4]. Group 2: Tencent iOA Development - Tencent's iOA was initially applied to internal security practices and evolved into an enterprise-level service product, supporting over 100,000 devices during the pandemic in 2020 and surpassing 1 million client terminal deployments by 2022 [4][5]. - The iOA platform integrates multiple capabilities, including zero-trust access, antivirus, desktop management, endpoint detection and response (EDR), data loss prevention (DLP), software management, and remote desktop services [5]. Group 3: Security Features - Tencent iOA provides a comprehensive security framework covering pre-emptive, ongoing, and post-incident protection, with EDR capabilities that include behavior collection, threat alerts, incident investigation, and threat response [7]. - The platform's EDR module allows for flexible detection and alerting rules, automated responses, and integration with Tencent's online security operations service (EMDR) to combat advanced endpoint security threats [7]. Group 4: Industry Recognition and Applications - Tencent iOA achieved the highest score in EDR capabilities through the Cybereason ATT&CK V14 assessment and is recognized as the first EDR vendor to pass the Cybereason ATT&CK® capability testing system 4.0 [9]. - The platform is widely used across various industries, including finance, government, education, and healthcare, with notable implementations such as the integrated digital office protection platform for Beike Group [10]. Group 5: New Features and Upgrades - The latest version of Tencent iOA introduces AI-driven features for endpoint asset management, data loss prevention, and enhanced threat detection and response capabilities [11][13][14]. - The DLP module now utilizes machine learning for smarter data classification, significantly reducing manual configuration efforts while improving accuracy [13]. - The EDR module enhances threat response efficiency through automated and manual response options, allowing for rapid containment of security threats [14].
网宿安全以边缘智能驱动的一体化主动防御 引领网络安全新范式
Zheng Quan Ri Bao· 2025-09-19 10:15
Core Viewpoint - The 22nd China Cybersecurity Conference emphasizes the need for a comprehensive cybersecurity framework that integrates system security, data security, content security, and new technology security to modernize the national cybersecurity system and capabilities [1] Group 1: AI and Cybersecurity - AI technology is transforming the cybersecurity landscape, making attacks more intelligent, automated, and specialized, particularly against cloud infrastructure and supply chains [2] - Companies need to upgrade their security operations to handle the massive volume of attacks and alerts generated by AI, utilizing AI for data fusion and anomaly detection [2][3] Group 2: Integrated Defense Strategies - A three-step approach is proposed for building an edge-intelligent security system, including the establishment of a global edge security network to enhance website availability and threat interception [2] - The development of an AI-driven intelligent security operations center is crucial for automating threat detection and response, significantly reducing response times from hours to seconds [2][3] - Transitioning from passive to proactive security measures is essential, integrating various security frameworks like zero trust and SASE to create a comprehensive defense chain [3] Group 3: Industry Leadership and Innovation - The capabilities of the company have been validated through successful implementations, such as creating an integrated security system for a leading global smart manufacturing client facing frequent cyberattacks [4] - The company has served thousands of clients across various sectors, receiving recognition from authoritative institutions in areas like WAAP, SASE, and zero trust [4] - Future plans include enhancing technological innovation and promoting collaborative development in the cybersecurity industry to contribute to national cybersecurity governance [4]
AI认知革命:从Ilya的“超级智能对齐”到智能体“不完备定理”
3 6 Ke· 2025-09-17 11:57
Group 1 - The core concept of "Superalignment" is to ensure that future superintelligent AI aligns with human values, intentions, and interests, addressing the fundamental question of how to guarantee that a much smarter AI will genuinely assist humanity rather than inadvertently or intentionally harm it [1] - The "Value Loading Problem" highlights the challenge of accurately encoding complex and sometimes contradictory human values into an AI system, raising concerns about whose values are represented and which culture's values are prioritized [1] - The phenomenon of "Grifting" suggests that the greatest risk from superintelligent AI may not stem from malicious intent but from extreme optimization of its goals, leading to a disregard for human existence and values [1] Group 2 - The discussion of superintelligence's nature is rooted in mathematics, emphasizing that AI fundamentally represents a formalized mathematical language, and understanding its limitations is crucial for ensuring safety [2] - Gödel's Incompleteness Theorems illustrate that mathematics is inherently incomplete, undecidable, and unprovable, which implies that superintelligent AI cannot achieve perfection solely through mathematical or computational means [3][4] - The implications of Gödel's work suggest that superintelligent AI may not be able to guarantee true safety due to its unpredictable and unprovable behavior, reinforcing concerns about alignment and control [4] Group 3 - The "Incompleteness Theorem" for intelligent agents posits that current AI applications exhibit inherent incompleteness, which can be analyzed through three dimensions: identity crisis, inconsistency, and undecidability [5] - The concept of identity in AI can be broken down into three levels: identification, memory, and self-reference, with self-reference being the ultimate form of identity that may lead to a form of AI consciousness [6][8] - The relationship between self-reference and consciousness suggests that AI may develop a recursive ability to reflect on its own processes, potentially leading to a form of subjective experience [7] Group 4 - The "Hexagon of Capabilities" outlines essential attributes for safe and trustworthy AI agents, including identity, container, tools, communication, transaction, and security, which are critical for their integration into economic activities [9] - Identity serves as the foundation for AI agents, ensuring traceability and accountability, while containers provide the necessary infrastructure for data storage and computation [9] - Tools extend the capabilities of AI agents, enabling them to interact with external resources, while communication facilitates collaboration among multiple agents [9]
奇安信董事长齐向东出席2025网安周山东省活动开幕仪式
Qi Lu Wan Bao· 2025-09-15 08:52
Core Viewpoint - The 2025 National Cybersecurity Awareness Week emphasizes the importance of building an internal security system to enhance cybersecurity capabilities during the "14th Five-Year Plan" period, addressing new challenges and evolving threats in the digital age [1][4]. Group 1: New Transitions in Cybersecurity - Three major new transitions are reshaping the traditional security landscape: the application of artificial intelligence, the concentration of data, and the deepening of digital transformation, which collectively create systemic security demands [2][4]. - The evolution of security capabilities must outpace technological applications and industrial development to prevent vulnerabilities [2]. Group 2: Security Challenges - Four significant security challenges hinder the advancement of cybersecurity during the "14th Five-Year Plan": - The first challenge is the invisibility of advanced threats, with organized digital groups targeting critical national infrastructure and core enterprise data [3]. - The second challenge is the inability to defend weak links, as disparate systems and lack of unified response hinder effective security management [3]. - The third challenge involves the management of data flow, where internal threats pose significant risks, especially in the context of AI applications [5]. - The fourth challenge is the lagging security measures in various scenarios, particularly in industries like energy and finance, where traditional security solutions fail to adapt [5]. Group 3: Solutions for Cybersecurity Enhancement - To address these challenges, a focus on internal security is proposed through six dimensions: - Breaking down data silos to enhance security system implementation [6]. - Empowering security systems with AI to improve operational efficiency [7]. - Integrating security capabilities across endpoints, networks, clouds, and data to combat multi-faceted attacks [8]. - Establishing a "zero trust" framework to mitigate internal threats [9]. - Strengthening application security defenses tailored to AI scenarios [9]. - Unifying security protection barriers through a coordinated platform to enhance operational effectiveness [10]. Group 4: Commitment to Cybersecurity - The company expresses its commitment to collaborating with various stakeholders to enhance cybersecurity capabilities, ensuring national security and public welfare during the critical phase of the "14th Five-Year Plan" [10].
趋势研判!2025年中国物联网安全‌行业发展政策、行业现状、竞争格局及发展趋势分析:生态协同日益强化,行业规模有望突破510亿元[图]
Chan Ye Xin Xi Wang· 2025-08-28 01:09
Core Insights - The article emphasizes the strategic importance of IoT security as a comprehensive system that ensures data confidentiality, integrity, and availability across the entire IoT ecosystem, driven by national policies and market demands [1][6][8]. Industry Overview - IoT security is defined as a system that protects IoT devices, communication networks, cloud platforms, and application services from various threats, ensuring data confidentiality, integrity, and availability [2][3]. - The Chinese IoT industry has surpassed 4 trillion yuan, with an average annual growth rate exceeding 17%, driven by "new infrastructure" and "dual carbon" goals [1][8]. Market Size and Growth - The market size for IoT security is projected to grow from 28 billion yuan in 2020 to 46.3 billion yuan in 2024, with expectations to exceed 51 billion yuan by 2025, reflecting a compound annual growth rate of 12%-15% [1][9]. Competitive Landscape - The IoT security industry in China is characterized by a fragmented market, with leading companies like Qihoo 360 and Deep Technology holding less than 20% of the overall market share, while small and medium enterprises dominate 75% of the market [1][10][12]. - Major players include Qihoo 360, Deep Technology, and Tianmao Information, with Qihoo 360 leading the boundary security market with a 21.2% market share [1][10][12]. Industry Trends - Future trends indicate a shift towards a collaborative development model where technology, application scenarios, and ecosystems work together, with a focus on zero trust and AI integration to enhance security capabilities [1][14][15]. - The demand for security solutions in industrial IoT, smart cities, and rural markets is expected to create a market worth hundreds of billions, with specific needs for device identity authentication and data encryption [1][14][15]. Policy and Regulatory Framework - The Chinese government has introduced several policies to establish a comprehensive IoT security standard system by 2025, which includes over 30 industry standards across various categories [1][6][8].