From August 14th to 15th, 2014, the 7th Mobile Internet International Symposium was held in Beijing International Conference Center. The theme of the conference was Innovation and Transformation in the Age of 4G Mobile Internet, focusing on...
The field of network and security has developed rapidly. Heres what Fortinet thinks about the important developments and trends of 2015: 1. Security violations are getting harder to defend Security breaches and data breaches remain a securi...
The hidden dangers of Internet security in China are getting bigger and bigger, and the security situation is getting more and more serious. Lu Hao, director of the National Internet Information Office, recently pointed out that China is a...
For me, information security is a fast and exciting area of development. There is new news in the industry almost every morning. Recently, I read a news article that the University of Science and Technology of China is investing in a...
With the rapid development of Internet technology, especially the rise of mobile Internet, it not only brings more convenient business experience to enterprises, but also saves most of the necessary IT investment. While enjoying these conve...
(CNW Lu Ningning interview) With the popularity of BYOD, the focus of SME network infrastructure is shifting from wired network to wireless network. Wireless network deployment has become the trend of future network deployment, especially f...
Fortinet (NASDAQ: FTNT), the worlds leading high-performance network security company, today announced a major update to the companys FortiOS network security operating system to further enhance the multifaceted capabilities of the FortiGat...
When the network structure inside the data center is undergoing earth-shaking changes, the security field that is inseparable from the network will also usher in a new round of challenges. Under the cloud computing system, data centers need...
Medical systems, from electronic cases to medical devices, are more vulnerable to attack than we think. If so, the cost is too high to be ignored. Today, in the black market, the price of medical records is 20 times higher than the price of...
Our workplace is undergoing a major change, and the BYOD (Bring Your Own Device) phenomenon is the most significant change from appearance to popularity. Enterprises have allowed or even encouraged employees to use their own equipment to ha...
Although the information security industry is groping in the dark, it does not mean that it cannot find the right direction. At present, whether it is for political or commercial purposes, or the theft of personal privacy, APT attacks are c...
During the period from January 1 to September 3, 2015, we collected some mail samples from global spam and extracted their metadata. Then we studied the words in the subject domain of the mail, or the hooks used by social workers. By taggin...