cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
3.15 | is the smart speaker safe?
Specialty is strength! China Software Evaluation Center thank you for your attention. Please follow us into a mysterious scientific and technological journey to understand the development trend of new technology and witness the continuous innovation of the information industry!
By Ron Burrows3 years ago in 01
Take stock of 9 types of security threats faced by small and medium-sized enterprises.
Nowadays, with the increasingly serious security threats, network security has become a major challenge for enterprises, especially for the development of small and medium-sized enterprises.
By Ron Burrows3 years ago in 01
Suggestions on preventing the risk of loopholes in artificial Intelligence Deep Learning Open Source platform.
At present, China, the United States, Europe and other countries and regions attach great importance to the development of artificial intelligence, seize the ecological construction of artificial intelligence deep learning open source platform, and vigorously promote platform-based intelligent manufacturing, intelligent energy, intelligent transportation and other applications.
By Ron Burrows3 years ago in 01
On the New changes of Industrial Security from the Ten Trends of Industrial Internet Security in 2022
The Internet era has entered the "second half", and the industrial Internet is ready to start. The rise of the industrial Internet is accompanied by new security problems.
By Ron Burrows3 years ago in 01
The Internet Information Office of the CPC Central Committee and other four departments issued the "key points for the work of improving the Digital Literacy and skills of the whole people in 2022"
Recently, the Central Internet Information Office, the Ministry of Education, the Ministry of Industry and Information Technology, and the Ministry of Human Resources and Social Security jointly issued the "key points of work on improving Digital Literacy and skills of the whole people in 2022" (hereinafter referred to as "work points"). The circular requires that we should persist in taking Xi Jinping's thinking on socialism with Chinese characteristics in the new era as the guidance, with the fundamental purpose of meeting the growing needs of the people for a better life, promoting people's all-round development, and the common prosperity of all the people. adhere to goal-oriented, problem-oriented, and result-oriented, take multiple measures to enhance the digital literacy and skills of the whole people, and greet the 20th CPC National Congress with outstanding achievements.
By Ron Burrows3 years ago in 01
Expert interpretation | Construction of Internet information service algorithm security supervision system
At present, the information process of human society is rapidly changing from digitalization and networking to the intelligent stage. With the development of artificial intelligence, big data and other new information technology, algorithms are widely used in Internet information services to provide personalized, accurate and intelligent information services for users. At the same time, the unreasonable application of the algorithm also affects the normal communication order, market order and social order, and brings severe challenges to the maintenance of ideological security, social fairness and justice and the legitimate rights and interests of netizens.
By Ron Burrows3 years ago in 01
The regulations on the recommendation of Internet Information Service algorithms will come into effect today.
The regulations on the recommendation of Internet Information Service algorithms jointly issued by the State Internet Information Office and other four departments will come into effect on March 1. For ordinary users, the algorithm can not be touched or understood, but it is widely affecting us to obtain Internet information services through various platforms.
By Ron Burrows3 years ago in 01
Take stock of 10 misunderstandings of network security, how many have you been hit?
" Under the dual challenges of network security situation and compliance, the formulation of network security strategy has become an important aspect of enterprise planning. However, many enterprises inevitably go into misunderstandings when formulating security policies.
By Ron Burrows3 years ago in 01
Talking about "Internet + Information Security Management" of Electric Power
With the popularization of Internet technology, network and information security are also facing new threats. As the central power enterprise under the jurisdiction of the five provinces and regions, China Southern Power Grid occupies an important position in China's power and energy industry. Power network and information system are now widely used and are developing at a high speed, and are becoming the core of the development of power information technology. The network and information security management of electric power has become an important part of electric power operation management.
By Ron Burrows3 years ago in 01
Talking about "Internet + Information Security Management" of Electric Power
With the popularization of Internet technology, network and information security are also facing new threats. As the central power enterprise under the jurisdiction of the five provinces and regions, China Southern Power Grid occupies an important position in China's power and energy industry. Power network and information system are now widely used and are developing at a high speed, and are becoming the core of the development of power information technology. The network and information security management of electric power has become an important part of electric power operation management.
By Ron Burrows3 years ago in 01










