Network security problems intensify, and industry giants such as Jingdong Security add code to network security

Since the beginning of last year, the cybersecurity world seems to have entered into an eventful period, with various incidents going on. From March 2017, it was revealed that Gmail and Yahoo had 21 million and 5 million accounts for sale on the black market, respectively; to March 2018, the data of more than 87 million Facebook users was leaked, during which various network security incidents occurred frequently. The continuous outbreak of these network security incidents has brought great panic to people, and it is imminent to strengthen the network security system.

A few days ago, JD Security and HITB jointly held the JD HITB Security Summit in Beijing. Since its establishment 15 years ago, this is the first time that HITB has entered China. This time, JD Security brought this world-class security conference to China, and gathered together with many world-renowned geeks and industry giants from Google, Tencent, 360 and other industry giants to discuss how to deal with future world cyber threats and build A more secure and credible online world, contributing to the network security community.

Network security problems intensify, and industry giants such as JD.com add code to network security

According to the 2018 Global Risk Report released by the World Economic Forum, cyber security has become an urgent problem to be solved. In fact, it is not difficult to find vulnerabilities in the network security field. What is difficult is how to effectively judge the hazard level of vulnerabilities.

At the JD HITB Security Summit, JD Group CTO Zhang Chen said: "Security is always a prerequisite for talking about future life. Protecting data and protecting users is protecting ourselves."

In recent years, the security industry has made a lot of efforts to assess the vulnerability level and how to deal with them efficiently, and achieved corresponding success. Take JD Security as an example, at this HITB, the AI ​​anti-hacking tool FUZE released by the JD Security Silicon Valley R&D team, the new AI training model dedicated to protecting user privacy and sensitive data, and the smart technology released by the JD Shepherd Security Lab. Vulnerability mining tools have attracted widespread attention in the industry.

The actual calculation data shows that the workload that originally took several days to complete by many engineers can be completed in just a few minutes after handing it over to FUZE. In the fight against black production, FUZE is a "nuclear weapon" level tool. .

As the black industry chain becomes more and more mature, the means of attack are more and more concealed and ever-changing, coupled with low cost and easy diffusion, posing a great threat to society. If you want to fight against the black production of the Internet, it may be difficult to rely on the power of one family alone. To this end, JD Security has carried out many international activities, allowing domestic and foreign security experts to collide with each other, and obtain the best results from them, bringing the latest solutions to the network security community. At the JD.com HITB Security Summit, in addition to wisdom sharing, there are also training, competitions, etc., so that engineers can better understand security and let more people participate. In addition, JD Security has also established a united front against online black production with industry giants such as Tencent, 360, and Google.

At the summit, Dhillon Kannabhiran, founder of HITB, also expressed his gratitude to JD Security for bringing HITB to China. In his opinion, "JD HITB Security Summit is not only a summit of technological innovation and exchange, but also an appreciation for the spirit of geeks and the pursuit of innovation. Spiritual tribute, we hope that through communication and sharing, the industry will pay more attention to safety and make more netizens realize the importance of safety."

In addition, the social problems caused by network security are becoming more and more serious. The black industry chain has invaded e-commerce, education, finance and other fields, and penetrated into all aspects of our lives. The network security problem has become a national problem, and even more so. National strategic level. Traditional network security companies and Internet giants have put forward many solutions on "how to fight against online black production", among which JD.com is the best among them. Its research reports have been accepted by DEFCON, which is known as the "Oscar" of the cyber security industry, and BLACKHAT, the "World Cup", and constantly bring solutions to the industry against black production.

Driven by interests, the scale of the online black market is constantly expanding, and both individuals, enterprises, and even countries are deeply affected. Under this circumstance, industry giants such as Jingdong Security have launched a number of related products and research reports to help fight against the black industry through in-depth research on network security, making a lot of contributions to my country's Internet security.

Focusing on AI security, IoT security, and blockchain security, JD.com fully escorts security

Zhang Chen, CTO of Jingdong Group, once said: From infrastructure, user experience, to all-channel platforms such as intelligent supply chain and intelligent logistics, security is the top priority. This is indeed the case, no matter what stage it is at, if it is successfully invaded by cyber black products, it will affect the overall development. In addition, "defense is in the clear, hackers are in the dark", when hackers use AI, IoT, blockchain and other technologies to launch attacks, their speed is much faster than the speed of enterprise defense. Although there are many companies in the market that are still slightly insufficient in speed when facing such attacks, it is not excluded that some companies, with the help of powerful core technologies and very forward-looking research concepts, are facing such attacks. When hackers attack, they can effectively counterattack, and JD.com is one of them.

On the one hand, AI is a double-edged sword. Hackers use AI to attack, which has a serious impact on network security. Hackers can use AI technology to carry out automated attacks, which can speed up attacks, reducing the speed of attacks from days two years ago to hours this year, increasing the pressure on the cybersecurity community. And with the help of AI technology, hackers are more likely to find loopholes in the system, and can easily implement criminal plans. For example, in a case handled by Tencent Security last year, one of the black gangs has strong technical skills. There is a doctoral research AI cracking verification code, and the cracking rate is as high as 90%.

But nothing is absolute, as long as it is done properly, AI is also a "good sword" in the fight against black production. In this regard, Jingdong Security believes that when the AI ​​capability is improved, if it is used by hackers, it will bring more serious consequences. Therefore, in terms of AI security, JD.com believes that the use of AI technology should be automated, and the purpose of improving product automation is achieved through human innovation, rather than all being dominated by machines, and thus launching AI that can improve automation. Anti-hacking tool FUZE. In addition, AI has super capabilities in defense. In training AI models, based on SGX and authentication technology, it can eliminate user sensitive information, pay attention to the protection of privacy, and beware of information leakage.

On the other hand, firmware determines the function and performance of hardware devices. If there is a security risk, it will bring a fatal blow. Therefore, in the field of IoT, firmware security is very important, and how to analyze firmware security is also particularly important. However, according to the previous analysis, each analysis will cause the firmware to crash and the hardware to be scrapped directly, which is a "suicide analysis". How to analyze the firmware under the premise of ensuring the security of the firmware is a big problem.

At present, many Internet companies have launched many IoT products and applications. Once they fail, they will suffer heavy losses. In order to avoid serious injury to companies with many IoT businesses such as JD.com and Tencent, IoT security has become the "object" that enterprises focus on. Tencent has conducted research on many devices to further analyze security issues such as drones and smart door locks. Based on the idea that "security defense cannot fail once", JD Security constantly tests products to ensure product safety. It not only establishes North American and domestic security laboratories, but also cooperates with well-known universities at home and abroad for a long time. Targeted security research results, and also developed the "Pangolin" mobile security vulnerability scanning platform, etc., to realize the analysis of firmware without hardware, to avoid hardware scrap, but also to strengthen analysis capabilities.

In addition, "how to protect privacy while providing better services" is a problem that enterprises have been thinking about for a long time, and the emergence of blockchain has given enterprises new hope. From the perspective of distributed storage, maintenance sharing and other characteristics of blockchain, it is not wrong to say that "blockchain is the best way to solve user privacy". In this regard, JD.com actively builds a "safety chain" trusted by users. Under the "uniqueness" of the blockchain, it better protects user privacy, and becomes a "can't come in, don't want to do, don't want to do it, don't want to do it, don't want to do it. Dare to do it.” Another protective wall outside the three security gates. Today, JD Security has done a lot on the underlying infrastructure, such as blockchain threat intelligence, blockchain authentication, and privacy blockchain.

In general, with the improvement of technical capabilities, the online black industry has become more and more unscrupulous. But as the saying goes, you have Zhang Liangji, and I have had a wall ladder. JD Security has made efforts to deploy AI security, IoT security, and blockchain security to protect the enterprise at a time when network black production is impossible to prevent.

Helping the new ecology of network security, JD Security promotes the arrival of a safe and orderly network environment

According to incomplete statistics, there are already millions of criminals in China directly or indirectly involved in online black production. In the face of the frenzied plundering of online black products, major Internet companies have already prepared defense weapons, such as big data, human comparison, face recognition, etc., various technologies to fight against network black production are emerging one after another.

But these new technologies can be used in the "anti-black production" movement, and can also be used by hackers as weapons to attack network security. Over the years, the security industry and cyber black industry have been playing a cat-and-mouse drama. To this end, the network security community should continue to increase research and development efforts, put forward practical issues, and launch products that can fight against network black production. As one of the strong players in the industry, Jingdong Security analyzes hacker attack methods through continuous in-depth research on black products. Based on this, Jingdong Security can gain an advantage in the fight against black products.

Although the online black industry is still raging, some industry powerhouses have played a good demonstration role in providing security for the security industry. For example, through continuous research and upgrading, Jingdong Security can bring the industry the advantages of effectively resisting hacker attacks and improving the efficiency of vulnerability patching, and while strengthening the industry's defense, it also gives the industry the ability to fight back against black production.

All in all, with the expansion of the scale of cyber black production, there are more and more “gatekeepers” in the cyber security field, and their abilities are getting stronger and stronger. The technical advantages and research results of JD Security in the fields of AI security, IoT security and blockchain security can strengthen the protection of enterprise privacy, optimize the analysis and detection process, and efficiently scan and repair vulnerabilities, so that enterprises can better fight against network black products. . It is believed that in the near future, under the escort of industry giants such as Jingdong Security, the Internet will usher in a safe and orderly environment.

CAT6 Cable

Cat 6 Lan Cable,Cat6 Ethernet Cable,Outdoor Cat6 Cable,Lan Cable Cat6

Zhejiang Wanma Tianyi Communication Wire & Cable Co., Ltd. , https://www.zjwmty.com

Posted on