In June 1, 2017 the formal implementation of "People's Republic of China network safety", greatly promoted the construction of information security protection work. Due to the requirements of information security level protection three level for internal control and auditing, various audit products on the market are mushrooming. Users will inevitably be misled by t
Medical information has officially entered the era of big data. Medical big data has solved the problem of massive data storage and retrieval, and has also created new security issues. How to better protect sensitive information and patient privacy has become a major problem facing hospital management in the era of large data. But in the interest of the drive, the medical industry data
A report from Identity Theft Resource Center and CyberScout showed that in the first 11 months of 2017, the global data leakage increased to 1202, which is 10% more than that of 1093 in 2016. The Internet produces a large number of "data" every day, and it is the value of the Internet to connect, integrate, and carry out the data.
In January 16th, Sichuan international online channel from the Public Security Bureau of Sichuan province "to the people's network security report" special press briefing was informed that in 2017, in the fight against network infringement of citizens' personal information crime special action, Sichuan Network Security Department of public security organs to crack down on the illegal acquisition, sale and infringement of citizens' personal information crime and use personal information of citizens engaged in
Recently, police in Haidian, Beijing, have broken together to destroy the computer information system. The suspect Zhong uses the authority of his own administrator to modify the application in the company's computer and steal 100 bits, worth millions of dollars. Before the fence, Zhong Mou was arrested. At present, Zhong is detained in criminal case for the crime of destroying the computer information system.
On January 16, 2018, Gemalto, a global leader in digital security, said that while most of the world's businesses (95%) have accepted cloud services, there are vast differences in the level of adoption of security measures by companies in different regions. Organizations r
On January 16, it was reported that Joe Sullivan, former chief security officer of Uber, insisted in closed proceedings that most of the allegations made by a former Uber employee against his security team were mostly false, without What to steal trade secrets from elsewhere, such as stealing trade secrets from Waymo, an Autodesk car company under Alphabet Inc. If such a thing really happened, it wou
In October 31st, the eighth session of the International Forum on Information Security (Infoforum-China) was held in the Holiday Inn Shenzhen Donghua Hotel. The meeting focused on information security topics, invite government agencies, from Russia's large IT company's board of directors and experts, as well as HUAWEI, Kai ang technology, the cloud security alliance (CSA), Chinese inform
The morning of September 26th, special association president Yang Zhiyong made a special trip to Shenzhen Kai ang technology headquarters, on behalf of special equipment Association awarded the second session of the executive director of the unit to Aung Kai technology plaque and in-depth exchanges with Liu Yongbo, President of Kai ang technology.
On Sept. 21, the three-day InfoSecurity Russia has come to an end. As one of the Chinese business representatives for this conference, Ankki Technology brings the latest in this global safety feast, Security products to attend the conference. Not only that, but also by virtue of its
Recently, another pound of news came. Ang Kai technology and Peking Union Medical College Hospital successfully signed Aung Kai database audit system will create a security fortress for the Xiehe Hospital database of Cach, guardian of the core sensitive data.