Data Security
-
Safe operations from the perspective of Party A and Party B
Large Internet enterprises in the exploration of enterprise information security, and gradually put forward the concept of security operations. For the ultimate guarantee of enterprise security needs, but also as an important responsibility of security operations, it is necessary to close the loop on all aspects of enterprise security through security operations practitioners.
-
How to implement secure and trusted data security encryption in your business?
Encryption of critical business data is an important measure to prevent leakage and unauthorized access to an organization's sensitive information. By implementing strong encryption technologies and strategies, organizations can mitigate business risks in the development of digital transformation and maintain the confidentiality, integrity and availability of their core data assets. But how should organizations choose the right encryption technologies, methods and tools?
-
Remote desktop AnyDesk hacked, user data security at risk!
AnyDesk, the well-known remote desktop software, has been hacked and some of its data compromised. The company has taken steps to fix the vulnerability and is advising users to reset their passwords and download the latest version of the software.
-
Cloudflare suspected of being attacked by state-sponsored hacker group
Cloudflare has disclosed that it was subjected to a potential national-level hack in which attackers illegally accessed its Atlassian servers through stolen credentials and ultimately accessed some of the documentation and limited source code.
-
Google sued for tracking users in incognito mode, agrees to pay $5 billion settlement
Google agreed to pay $5 billion to settle a privacy lawsuit alleging that the company tracked users in incognito mode. The lawsuit accused Google of using tools such as Google Analytics to collect data on users even when they thought they were browsing privately.
-
[Trial] Ministry of Industry and Information Technology launches emergency response plan for classification and classification of data security incidents
On December 16, 2023, the Ministry of Industry and Information Technology (MIIT) published a draft proposal on Friday, detailing the measures for the implementation of the "Data Security Law" and "Measures for the Management of Data Security in the Industrial and Information Technology Sector (Trial)" plan.
-
Agent Racoon malicious backdoor attacks organizations in the Middle East, Africa and other countries
"This malware family is written using the .NET framework and leverages the Domain Name Service (DNS) protocol to create...
-
Breaking News: National Data Administration discusses data infrastructure for the first time
Promote the construction of data infrastructure and contribute to the development of my country's data industry.
-
Practice and exploration of consumer personal information protection in takeaway business scenarios
With the rapid development and popularization of the digital economy, consumers' awareness of personal privacy protection in various consumption scenarios is also increasing. This article focuses on analyzing the high-frequency scenarios of personal privacy leakage in the food delivery industry and its governance measures. Taking the "Privacy Form", a consumer personal user privacy data protection plan under the "Consumer Personal Privacy Protection Special" on the Ele.me platform, as an example, we interpret the new model of user privacy data protection in the takeout scenario and analyze the entire business chain. The difficulty and feasibility of the road.
-
Building data security operation capabilities from the perspective of Didi security incidents
1. Introduction On the evening of December 9, 2021, the Apache Log4j2 remote code execution vulnerability (CVE-2021-44228) detonated the world. This vulnerability can be called an epic vulnerability, with a CVSS score of 10 out of 10, affecting…