<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          USEUROPEAFRICAASIA 中文雙語Fran?ais
          Business
          Home / Business / Industries

          Expert values US-China cooperation, as companies hammer out programs for cyber security

          Xinhua | Updated: 2017-07-24 10:40

          LAS VEGAS, the United States — A US expert highlighted the progressive cooperation between the United States and China in cyber security, as companies strive for better solutions and top hackers started their annual meetings here on Saturday.

          US-China co-op highly valued

          Susan Shirk, Chair of the 21st Century China Center of University of California, San Diego, noticed that the bilateral cooperation evolved since leaders of the two countries met in April.

          "Then we went to the G20 and tried to make it a global norm. So I think this is a great example of how the US and China through frank negotiation can address a very difficult topic to make progress and then to move forward," she told Xinhua.

          As enterprises need to strengthen their defense to make their own systems secure, government efforts are equally important to address the issue, said Shirk.

          "I do think it's the governments' responsibility to try to work at the government to government level. We'd like to see government crack on it," she added in a recent interview.

          Tech firms always on alert

          While governments remain active, IT producers are on high alert and intensively prepared to counter any attack.

          "We have many layers of open security, encryption capability, fault tolerance capability, buffering, and so on. There is a lot of capability that Intel can bring, but there a lot of third parties out there that will bring that to the table," Jon Marshall, Senior Technical Marketing Engineer of Intel, told Xinhua.

          Keith Shank, director of Advanced Technology Labs of Ericsson, also took a hardened stance.

          "Ericsson is working to make extreme robust networks that can tell what's been hacked. Not necessarily stopping, because that's really hard to do. However, you (can) know what's been impacted, so you can avoid it," Shank said.

          Thorsten Held, managing director at White Encryption Code and Data Protection, emphasized the importance of web safety for automobiles.

          "If anyone tries to modify the application, our system will set off some kind of alarm, which will recognize there is a modification, which can be classified as an attack and stop the execution," Held said.

          On Wednesday, the Cyber Readiness Institute (CRI) was launched as a joint project between the Center for Global Enterprise and the Center for Responsible Enterprise and Trade.

          The non-profit organization will bring together senior leaders of global companies to discuss best practices for managing security employees, processes and technology.

          Hackers are restless

          In the battle field of IT, winner is always closely followed by challengers. Winner can be turned into underdog any minute.

          In the city known as the gambling capital of the world, the annual Black Hat Conference opened on Saturday with its training session in the traditional high-stake style, where the bettors are cloak and dagger and the outsiders including the media are hard to get a chance to peek into the risks they take.

          The conference was initiated in 1997 to involve system and network administrators, hackers and computer security experts, as a pal event of DEF CON, whose annual meeting will start on July 27 when the Black Hat is concluded.

          DEF CON was created in 1993 as one of the world's largest hacker conventions, held annually in Las Vegas, Nevada.

          During the Black Hat Conference, researchers will release an open-source SS7 firewall that aims to bolster security of mobile operators' core networks.

          SS7 vulnerabilities, which can allow cyber criminals to hijack two-factor authentication codes texted to mobile phones, read and re-direct text messages, eavesdrop on phone calls, and track a phone's location, have existed since 2014.

          Most Viewed in 24 Hours
          Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
           
          主站蜘蛛池模板: 国产天美传媒性色av| 国产精品久久香蕉免费播放| 4虎四虎永久在线精品免费| 人人人澡人人肉久久精品| 天天躁日日躁狠狠躁超碰97| 国内精品免费久久久久电影院97| 成人网站在线进入爽爽爽| 日韩av一区二区不卡在线| 亚洲综合色婷婷中文字幕| 人妻无码中文专区久久app| 人妻丝袜无码专区视频网站| a国产一区二区免费入口| 日本成熟少妇激情视频免费看 | 激情综合网激情综合网激情| 国产办公室秘书无码精品99| av在线播放无码线| 国产内射性高湖| 扒开粉嫩的小缝隙喷白浆视频| 麻花传剧mv在线看免费| 亚州AV无码一区东京热久久| 国产午夜福利视频合集| 欧美极品色午夜在线视频| 亚洲一区在线成人av| 日韩av伦理一区二区| 国产成人精品一区二区无| 国产伦理自拍视频在线| 国产免费性感美女被插视频| 国产AV影片麻豆精品传媒| 果冻传媒一区二区天美传媒| 国产精品一区二区久久岳| 国产成人剧情AV麻豆果冻| 亚洲熟女乱色综合一区 | 日本一卡2卡3卡四卡精品网站| 成 人 免费 在线电影| 免费无码av片在线观看播放| 又大又黄又粗高潮免费| 377P欧洲日本亚洲大胆| 成人免费无码大片A毛片抽搐色欲| 99久久这里只有免费精品| 在线中文字幕国产一区| 男人狂桶女人出白浆免费视频|