cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
The Ministry of Industry and Information Technology completes the task of ensuring the security of the opening ceremony of the Beijing Winter Paralympic Games
On the evening of March 4, the opening ceremony of the Beijing Winter Paralympic Games was held at the National Stadium "Bird's Nest". The relevant departments and bureaus of the Ministry of Industry and Information Technology and the relevant departments and systems of the Ministry of Industry and Information Technology worked closely, scrupulously performed their duties and fought continuously to complete the tasks of radio security, information communication and network security for the opening ceremony of the Winter Paralympic Games.
By Ron Burrows3 years ago in 01
Expert interpretation | Building a landing support system for algorithm governance
With the rapid development of network information technology, big data, cloud computing, algorithm and artificial intelligence and other technologies are widely used in social networking, shopping, tourism, medical, job hunting, video and other platforms and application scenarios. The emerging format of the Internet has brought great convenience to people and shaped people's new way of life. At the same time, due to the fast iterative speed of information technology update, various development forms, and more and more complex emerging formats, big data mining and algorithm through user behavior analysis, as well as historical data mining, bring convenience to the personalized service of users, and inject new momentum into economic and social development. However, the unreasonable application of algorithms such as algorithm discrimination, "big data killing familiarity", induced addiction, violation of laws and bad information recommendation also touches on such issues as user information security and rights and interests protection. and has a profound impact on the normal communication order, market order and social order, and brings new challenges to China's existing laws and regulations and regulatory governance system.
By Ron Burrows3 years ago in 01
What is the impact of the East-West Project on China's data center industry?
On February 17, 2022, 8 national computing hub nodes and 10 national data center clusters completed the approval, the national integrated big data center system completed the overall layout design, and the project of "counting the east and counting the west" was officially launched in an all-round way. Since then, there has been a national discussion on the national strategy of the data center and its industrial development.
By Ron Burrows3 years ago in 01
Expert interpretation | Building a landing support system for algorithm governance
With the rapid development of network information technology, big data, cloud computing, algorithm and artificial intelligence and other technologies are widely used in social networking, shopping, tourism, medical, job hunting, video and other platforms and application scenarios. The emerging format of the Internet has brought great convenience to people and shaped people's new way of life. At the same time, due to the fast iterative speed of information technology update, various development forms, and more and more complex emerging formats, big data mining and algorithm through user behavior analysis, as well as historical data mining, bring convenience to the personalized service of users, and inject new momentum into economic and social development. However, the unreasonable application of algorithms such as algorithm discrimination, "big data killing familiarity", induced addiction, violation of laws and bad information recommendation also touches on such issues as user information security and rights and interests protection. and has a profound impact on the normal communication order, market order and social order, and brings new challenges to China's existing laws and regulations and regulatory governance system.
By Ron Burrows3 years ago in 01
Notice of the State Internet Information Office on the regulations on the Management of Internet Pop-up Information push Service (draft for soliciting opinions)
In order to further standardize the management of Internet pop-up information push service, protect the legitimate rights and interests of citizens, legal persons and other organizations, carry forward socialist core values, and create a clear cyberspace. According to the laws and regulations such as the Network Security Law of the people's Republic of China, the Law of the people's Republic of China on the Protection of minors, the Advertising Law of the people's Republic of China, the measures for the Administration of Internet Information Service, and the provisions on the Ecological Governance of Network Information content, our office drafted the regulations on the Management of Internet Pop-up Information push Service (draft for soliciting opinions), which is now open to the public to solicit opinions.
By Ron Burrows3 years ago in 01
Follow us.
Want to know who is the most stressful in the enterprise these days? Is the chief information security officer. Because they are senior managers responsible for developing and implementing information security programs, they will be held responsible if violations occur.
By Ron Burrows3 years ago in 01
Data leaks occur frequently, is DLP a panacea to solve the problem of data leakage?
# DLP 2 In recent years, data leaks occur frequently. According to the 2021 data breach cost report released by IBM, the average total cost of data disclosure will increase by 10% from 2020 to 2021, with an average cost of $401 million for very large-scale data leaks resulting in 50 million to 65 million record leaks.
By Ron Burrows3 years ago in 01
The project of "calculation of the East and the West" has been officially launched, and the eight computing hubs are ready to start.
Share my thoughts and create your world. "Sadie consultant" helps you interpret the hot spots of industry and economy in an all-round way and make strategic decisions scientifically.
By Ron Burrows3 years ago in 01
3.15 | is the smart speaker safe?
Specialty is strength! China Software Evaluation Center thank you for your attention. Please follow us into a mysterious scientific and technological journey to understand the development trend of new technology and witness the continuous innovation of the information industry!
By Ron Burrows3 years ago in 01
Take stock of 9 types of security threats faced by small and medium-sized enterprises.
Nowadays, with the increasingly serious security threats, network security has become a major challenge for enterprises, especially for the development of small and medium-sized enterprises.
By Ron Burrows3 years ago in 01
Suggestions on preventing the risk of loopholes in artificial Intelligence Deep Learning Open Source platform.
At present, China, the United States, Europe and other countries and regions attach great importance to the development of artificial intelligence, seize the ecological construction of artificial intelligence deep learning open source platform, and vigorously promote platform-based intelligent manufacturing, intelligent energy, intelligent transportation and other applications.
By Ron Burrows3 years ago in 01











