网络安全

Search documents
斗象科技完成2亿元桥梁战略轮融资:聚焦安全数据分析,钟鼎资本独家投资
Sou Hu Cai Jing· 2025-09-04 09:50
Core Insights - Douxiang Technology has completed a new round of bridge strategic financing amounting to 200 million yuan, exclusively invested by Zhongding Capital [2] - The financing will enhance the company's R&D investment in AI security technology and platform security intelligence, supporting its long-term strategic layout and future capital plans, including an IPO [2] Company Overview - Douxiang Technology was established in 2014, with a registered capital of 12.0054 million yuan, and is a platform-based cybersecurity provider driven by intelligent technology [2] - The company focuses on security data analysis and online security operations, operating under brands such as Douxiang Intelligent Security, Vulnerability Box, and FreeBuf [2] - The actual controller of Douxiang Technology is Xie Chen, who holds 36.31% of the voting rights and serves as the chairman and general manager [2]
天融信:公司在“AI+安全”方面已有技术研究和应用
Zheng Quan Ri Bao· 2025-09-04 09:08
Group 1 - The company has developed technology and applications in the "AI + security" sector, addressing key risks such as data leakage and malicious injection [2] - A new product, the large model security gateway, has been launched, which includes a multi-modal pre-trained security detection model and integrates core technologies for comprehensive intelligent defense from network to application layers [2] - The company's network data leakage prevention system utilizes deep content recognition technologies, including fingerprint databases, data identifiers, weighted dictionaries, and machine clustering, to accurately monitor network data transmission behaviors and content characteristics [2]
“十四五”期间 我国在航空航天等领域牵头制定国际标准532项
Yang Shi Xin Wen· 2025-09-04 08:19
Core Insights - During the "14th Five-Year Plan" period, China has taken on 26 technical secretariats in international standard organizations in key areas such as high-end equipment and intelligent manufacturing [1] - Chinese experts have assumed the chairmanship of 30 technical institutions and led 486 working groups for the formulation and revision of international standards [1] - A total of 880 proposals for international standards have been put forward in fields like new energy vehicles, new power systems, and aerospace, with 532 international standards being actively developed [1] - The conversion rate of advanced applicable international standards into Chinese standards exceeds 90% in key areas, with 4,210 international standards being transformed [1] Industry Development - The State Administration for Market Regulation emphasizes the integration of Chinese wisdom into international standards in critical and emerging technology fields such as artificial intelligence, cybersecurity, and brain-computer interfaces [1] - In the brain-computer interface sector, Chinese experts are leading the development of international standards that will unify terminology and data formats, promoting innovation and large-scale industrial development [1]
天融信大股东减持套现9900万元 上半年亏损6469万元
Zhong Guo Jing Ji Wang· 2025-09-04 06:01
天融信表示,郑钟南的本次变动涉及的股份减持行为,均为履行已披露的2次股份减持计划。公司于2021年5月25日披露了《关于持股5%以上股东减 持股份预披露公告》(公告编号:2021-048);公司于2025年8月12日披露了《关于持股5%以上股东减持股份预披露公告》(公告编号:2025-039)。 截至公告披露日,本次减持与此前已披露的2次减持计划和相关承诺一致,减持数量在已披露的减持计划范围内。 本次变动后,郑钟南于2025年8月12日披露的股份减持计划尚未实施完毕,后续其将严格按照相关法律法规及规范性文件的要求及时披露减持进展 公告。 天融信2024年年报显示,郑钟南为公司第一大股东。公司于2020年10月26日召开2020年第四次临时股东大会和第六届董事会第一次会议,选举产生 了公司第六届董事会成员并聘任了公司高级管理人员。会议召开后,公司根据《公司法》《上市公司收购管理办法》以及《深圳证券交易所股票上市规 则》等法律法规的相关规定,结合公司股权结构和董事会成员提名情况,公司股东大会、董事会的表决机制和程序设定,以及是否存在管理层控制、多 个股东共同控制或管理层与股东共同控制情况,对公司控制权情况进行了谨 ...
【私募调研记录】睿郡资产调研澜起科技、山石网科等3只个股(附名单)
Zheng Quan Zhi Xing· 2025-09-04 00:09
Group 1: Company Highlights - Lanqi Technology's main products include memory interface chips, server platforms, and consumer electronics chips, primarily used in data centers and servers [1] - Shanshi Network Technology plans to conduct its first ASIC chip technology tape-out, aiming to launch firewall products with ASIC technology in 2024; the company has established strong partnerships with major cloud service providers [1] - Zoomlion's market outlook is cautiously optimistic, with a focus on equipment replacement and growth in overseas revenue, particularly in Africa and the Middle East, which saw a year-on-year increase of approximately 15% [1] Group 2: Investment Insights - Lanqi Technology's products are positioned in high-demand sectors, indicating potential growth opportunities in the data center market [1] - Shanshi Network Technology's development of a comprehensive solution combining computing power and security applications may enhance its competitive edge in the cybersecurity market [1] - Zoomlion's commitment to increasing resource investment in Latin America, Africa, and Europe, along with a strong dividend policy, reflects a strategy aimed at long-term stability and growth [1]
【私募调研记录】泓澄投资调研山石网科
Zheng Quan Zhi Xing· 2025-09-04 00:09
根据市场公开信息及9月3日披露的机构调研信息,知名私募泓澄投资近期对1家上市公司进行了调研, 相关名单如下: 机构简介: 公司成立:泓澄投资由张弢和几位同行于2015年4月共同创立。创始人工作经验和知识结构互补。xa0长 期愿景:通过实质性的合伙人文化,构建一个对优秀资金管理者有吸引力的平台,为大众投资人创造长 期稳定的收益。xa0公司文化:开放、平等、共享、包容。xa0 以上内容为证券之星据公开信息整理,由AI算法生成(网信算备310104345710301240019号),不构成投资建议。 1)山石网科 (北京泓澄投资管理有限责任公司参与公司电话会议) 个股亮点:公司将进行 ASIC 芯片技术的第一次流片,若一次流片成功,公司有望在 2024 年推出载有 ASIC 芯片技术的防火墙产品。;公司发布DeepSeek大模型应用一体机解决方案,致力于为用户提供一 站式"算力+大模型+安全应用"服务能力;公司与华为云、天翼云、阿里云、浪潮云等国内云厂商建立 了良好的合作关系 ...
致敬伟大胜利 九三大阅兵举行
第一财经· 2025-09-03 15:03
Core Viewpoint - The article discusses the grand military parade held on September 3rd to commemorate the 80th anniversary of China's victory in the Anti-Japanese War and the World Anti-Fascist War, highlighting China's military modernization and commitment to peace and justice [2][3]. Summary by Sections Military Display - The parade featured over 10,000 troops, hundreds of ground equipment, and more than a hundred aircraft, showcasing a new layout of military strength [4]. - The aerial display included 9 helicopters forming the number "80" and banners proclaiming "Justice Prevails," "Peace Prevails," and "People Prevail" [3][11]. - All showcased military equipment was domestically produced, with many models making their public debut [7][10]. Aerial Forces - The air force segment included advanced aircraft such as the Airborne Early Warning and Control (AEW&C) aircraft, fighter jets, and bombers, demonstrating a comprehensive range of capabilities [10][14]. - Notable aircraft included the Airborne Early Warning 600, J-20A, J-20S, and J-35, which were all presented for the first time [10][11]. - The transport aircraft segment featured the Y-20A and Y-20B, highlighting their long-range strategic delivery capabilities [14]. Ground Forces - The parade included various ground equipment, with 115 Dongfeng military vehicles participating, showcasing their role in modern military operations [15][16]. - The Dongfeng military vehicles have been a regular feature in parades since 1984, indicating their significance in China's military history [16]. Nuclear Capabilities - The Dongfeng-5C intercontinental ballistic missile was displayed, emphasizing China's global strike capabilities and deterrence strategy [20][23]. Observers and Participants - The event was attended by representatives from various sectors, including logistics and technology, who expressed pride in the nation's military advancements and commitment to peace [21][29]. - Notable attendees included leaders from major companies and academic institutions, who emphasized the importance of national security and technological advancement in the context of military strength [31][32].
专家:你的病情隐私能否成为大数据的一部分?|数博会
Zhong Guo Jing Ying Bao· 2025-09-03 14:44
Core Viewpoint - The ownership of patient medical records is a contentious issue, with hospitals, doctors, and patients each claiming rights over the data generated during medical treatment [1][2]. Group 1: Data Ownership and Privacy - Data is recognized as a new production factor, but its ownership remains disputed, particularly regarding patient medical records [1]. - Patients consider their medical records as personal privacy, while doctors argue that their expertise is necessary for data generation, and hospitals claim that without their equipment, data cannot exist [1]. - Ordinary outpatient medical records are typically owned or managed by patients, while inpatient records are managed or owned by hospitals [1]. Group 2: Challenges in Data Utilization - The complexity of data ownership leads to difficulties in data circulation and utilization, with concerns about data leakage and privacy infringement [2]. - The concept of "privacy computing" is proposed as a potential solution, allowing data value extraction without accessing original data, thus addressing ownership ambiguities [2]. - Privacy computing enables collaborative data use without transferring data outside its original domain, mitigating security and privacy risks [2]. Group 3: Technical Aspects of Privacy Computing - Privacy computing faces performance limitations, particularly in distributed models that rely on complex algorithms and frequent data transmission [3]. - New centralized privacy computing models have emerged to alleviate performance issues by encrypting data within a trusted execution environment [3]. - A hybrid approach combining centralized and distributed privacy computing is recommended based on specific needs, balancing data security and performance [3].
【网络安全宣传周】没有网络安全,就没有国家安全!这些网络安全知识要牢记!
天天基金网· 2025-09-03 10:34
Core Viewpoint - The article emphasizes the importance of cybersecurity in the digital age, highlighting the potential risks and the need for a robust legal framework to protect against cyber threats [3][12]. Legal Framework - The "Cybersecurity Law of the People's Republic of China" was enacted on June 1, 2017, as the first comprehensive law regulating cybersecurity management in China [5]. - The "Regulations on the Security Protection of Critical Information Infrastructure" came into effect on September 1, 2021, focusing on the protection of critical information infrastructure [6]. - The "Data Security Law" was passed on June 10, 2021, and is a foundational law in the field of data security [7]. - The "Automotive Data Security Management Regulations (Trial)" were implemented on October 1, 2021, to regulate data processing in the automotive sector [8]. - The "Personal Information Protection Law" took effect on November 1, 2021, aimed at protecting personal information rights [9]. - The "Cybersecurity Review Measures" were revised and came into effect on February 15, 2022, to enhance cybersecurity and data security [10]. - The "Interim Measures for the Management of Generative Artificial Intelligence Services" were enacted on August 15, 2023, to regulate AI services [11]. Critical Information Infrastructure - Critical information infrastructure includes essential sectors such as energy, transportation, water resources, finance, and national defense, where damage could severely impact national security and public interest [15]. - The identification of critical information infrastructure is managed by relevant governmental departments, which develop rules based on industry-specific conditions [16]. Security Incidents - Notable cybersecurity incidents include the 2015 Ukraine power grid attack, the 2016 Dyn DNS attack, and the 2021 Colonial Pipeline ransomware attack, all of which highlight the vulnerabilities in critical infrastructure [19]. Security Measures - The "Regulations on the Security Protection of Critical Information Infrastructure" were published on August 17, 2021, to establish a national security protection system [20]. - The national standard for critical information infrastructure security protection was released on November 7, 2022, and implemented on May 1, 2023, providing guidance for security measures [20]. Data Security - Data is categorized into general, important, and core data levels based on the potential harm caused by unauthorized access or breaches [25]. - Organizations are encouraged to implement data security measures such as backup, encryption, and access control to protect sensitive information [26][28]. Cybercrime Prevention - The article discusses various types of cybercrimes, including phishing attacks and telecom fraud, and emphasizes the need for individuals and organizations to adopt preventive measures [21][30]. - Recommendations include protecting personal information, using official channels for transactions, and verifying requests for financial transactions [30][32]. Collective Responsibility - Cybersecurity is portrayed as a collective responsibility, urging society to work together to strengthen defenses and protect the digital environment [34].
雷军周鸿祎徐立等多位科技界企业家科学家受邀登上阅兵观礼台
第一财经· 2025-09-03 09:57
2025.09. 03 9月3日,受邀登上阅兵观礼台的多名企业家和学术界知名人士都向第一财经记者表示,阅兵观礼现场非常震撼,感受到祖国正在不断发展强大。 人工智能公司商汤科技董事长兼CEO徐立发出了观礼现场与香港科技大学校董会主席、人工智能专家沈向洋等人的合照。 徐立对第一财经记者表示:"非常荣幸能够参与本次纪念大会,这是值得毕生珍藏的庄严时刻。非常激动,特别是现场全场合唱'歌唱祖国'的时候,特别 感受到祖国强大。" 徐立称,我们正迎来科技创新发展的最好时代,国家高度重视科技进步,对人工智能等前沿领域给予了有力引导和支持,让企业备受鼓舞。 现场参加阅兵观礼的人工智能头部企业高管还有第四范式董事长戴文渊,他对第一财经记者表示:"现场非常震撼!" 千寻位置CEO陈金培也对第一财经记者表示:"有幸来感受祖国的日益强大,现场观礼,感觉就是震撼、自豪和时间过得太快,当DF-5C经过时,现场 沸腾了!" 多位科技企业家提及,80年前的历史提醒中国人民和平来之不易。 本文字数:1252,阅读时长大约3分钟 作者 | 第一财 经 钱童心 吕倩 奇安信集团董事长齐向东对第一财经记者表示:"我这是第二次参加抗战胜利阅兵的观礼,我 ...