cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
Notice of the State Internet Information Office on the regulations on the Management of Internet Pop-up Information push Service (draft for soliciting opinions)
In order to further standardize the management of Internet pop-up information push service, protect the legitimate rights and interests of citizens, legal persons and other organizations, carry forward socialist core values, and create a clear cyberspace. According to the laws and regulations such as the Network Security Law of the people's Republic of China, the Law of the people's Republic of China on the Protection of minors, the Advertising Law of the people's Republic of China, the measures for the Administration of Internet Information Service, and the provisions on the Ecological Governance of Network Information content, our office drafted the regulations on the Management of Internet Pop-up Information push Service (draft for soliciting opinions), which is now open to the public to solicit opinions.
By Ron Burrows3 years ago in 01
Follow us.
Want to know who is the most stressful in the enterprise these days? Is the chief information security officer. Because they are senior managers responsible for developing and implementing information security programs, they will be held responsible if violations occur.
By Ron Burrows3 years ago in 01
Data leaks occur frequently, is DLP a panacea to solve the problem of data leakage?
# DLP 2 In recent years, data leaks occur frequently. According to the 2021 data breach cost report released by IBM, the average total cost of data disclosure will increase by 10% from 2020 to 2021, with an average cost of $401 million for very large-scale data leaks resulting in 50 million to 65 million record leaks.
By Ron Burrows3 years ago in 01
The project of "calculation of the East and the West" has been officially launched, and the eight computing hubs are ready to start.
Share my thoughts and create your world. "Sadie consultant" helps you interpret the hot spots of industry and economy in an all-round way and make strategic decisions scientifically.
By Ron Burrows3 years ago in 01
3.15 | is the smart speaker safe?
Specialty is strength! China Software Evaluation Center thank you for your attention. Please follow us into a mysterious scientific and technological journey to understand the development trend of new technology and witness the continuous innovation of the information industry!
By Ron Burrows3 years ago in 01
Take stock of 9 types of security threats faced by small and medium-sized enterprises.
Nowadays, with the increasingly serious security threats, network security has become a major challenge for enterprises, especially for the development of small and medium-sized enterprises.
By Ron Burrows3 years ago in 01
Suggestions on preventing the risk of loopholes in artificial Intelligence Deep Learning Open Source platform.
At present, China, the United States, Europe and other countries and regions attach great importance to the development of artificial intelligence, seize the ecological construction of artificial intelligence deep learning open source platform, and vigorously promote platform-based intelligent manufacturing, intelligent energy, intelligent transportation and other applications.
By Ron Burrows3 years ago in 01
On the New changes of Industrial Security from the Ten Trends of Industrial Internet Security in 2022
The Internet era has entered the "second half", and the industrial Internet is ready to start. The rise of the industrial Internet is accompanied by new security problems.
By Ron Burrows3 years ago in 01
The Internet Information Office of the CPC Central Committee and other four departments issued the "key points for the work of improving the Digital Literacy and skills of the whole people in 2022"
Recently, the Central Internet Information Office, the Ministry of Education, the Ministry of Industry and Information Technology, and the Ministry of Human Resources and Social Security jointly issued the "key points of work on improving Digital Literacy and skills of the whole people in 2022" (hereinafter referred to as "work points"). The circular requires that we should persist in taking Xi Jinping's thinking on socialism with Chinese characteristics in the new era as the guidance, with the fundamental purpose of meeting the growing needs of the people for a better life, promoting people's all-round development, and the common prosperity of all the people. adhere to goal-oriented, problem-oriented, and result-oriented, take multiple measures to enhance the digital literacy and skills of the whole people, and greet the 20th CPC National Congress with outstanding achievements.
By Ron Burrows3 years ago in 01
Expert interpretation | Construction of Internet information service algorithm security supervision system
At present, the information process of human society is rapidly changing from digitalization and networking to the intelligent stage. With the development of artificial intelligence, big data and other new information technology, algorithms are widely used in Internet information services to provide personalized, accurate and intelligent information services for users. At the same time, the unreasonable application of the algorithm also affects the normal communication order, market order and social order, and brings severe challenges to the maintenance of ideological security, social fairness and justice and the legitimate rights and interests of netizens.
By Ron Burrows3 years ago in 01
The regulations on the recommendation of Internet Information Service algorithms will come into effect today.
The regulations on the recommendation of Internet Information Service algorithms jointly issued by the State Internet Information Office and other four departments will come into effect on March 1. For ordinary users, the algorithm can not be touched or understood, but it is widely affecting us to obtain Internet information services through various platforms.
By Ron Burrows3 years ago in 01











