LAS VEGAS, the United States, July 22 -- A U.S. expert highlighted the progressive cooperation between the United States and China in cyber security, as companies strive for better solutions and top hackers started their annual meetings here on Saturday.
U.S.-CHINA CO-OP HIGHLY VALUED
Susan Shirk, Chair of the 21st Century China Center of University of California, San Diego, noticed that the bilateral cooperation evolved since leaders of the two countries met in April.
"Then we went to the G20 and tried to make it a global norm. So I think this is a great example of how the U.S. and China through frank negotiation can address a very difficult topic to make progress and then to move forward," she told Xinhua.
As enterprises need to strengthen their defense to make their own systems secure, government efforts are equally important to address the issue, said Shirk.
"I do think it's the governments' responsibility to try to work at the government to government level. We'd like to see government crack on it," she added in a recent interview.
TECH FIRMS ALWAYS ON ALERT
While governments remain active, IT producers are on high alert and intensively prepared to counter any attack.
"We have many layers of open security, encryption capability, fault tolerance capability, buffering, and so on. There is a lot of capability that Intel can bring, but there a lot of third parties out there that will bring that to the table," Jon Marshall, Senior Technical Marketing Engineer of Intel, told Xinhua.
Keith Shank, Director of Advanced Technology Labs of Ericsson, also took a hardened stance.
"Ericsson is working to make extreme robust networks that can tell what's been hacked. Not necessarily stopping, because that's really hard to do. However, you (can) know what's been impacted, so you can avoid it," Shank said.
Thorsten Held, managing director at White Encryption Code and Data Protection, emphasized the importance of web safety for automobiles.
"If anyone tries to modify the application, our system will set off some kind of alarm, which will recognize there is a modification, which can be classified as an attack and stop the execution," Held said.
On Wednesday, the Cyber Readiness Institute (CRI) was launched as a joint project between the Center for Global Enterprise and the Center for Responsible Enterprise and Trade.
The non-profit organization will bring together senior leaders of global companies to discuss best practices for managing security employees, processes and technology.
HACKERS ARE RESTLESS
In the battle field of IT, winner is always closely followed by challengers. Winner can be turned into underdog any minute.
In the city known as the gambling capital of the world, the annual Black Hat Conference opened on Saturday with its training session in the traditional high-stake style, where the bettors are cloak and dagger and the outsiders including the media are hard to get a chance to peek into the risks they take.
The conference was initiated in 1997 to involve system and network administrators, hackers and computer security experts, as a pal event of DEF CON, whose annual meeting will start on July 27 when the Black Hat is concluded.
DEF CON was created in 1993 as one of the world's largest hacker conventions, held annually in Las Vegas, Nevada.
During the Black Hat Conference, researchers will release an open-source SS7 firewall that aims to bolster security of mobile operators' core networks.
SS7 vulnerabilities, which can allow cyber criminals to hijack two-factor authentication codes texted to mobile phones, read and re-direct text messages, eavesdrop on phone calls, and track a phone's location, have existed since 2017.
2016高考英语外研版必修3《Module 5 Great People and Great Inventions of Ancient China》SectionⅢ速效提能演练
2016高考英语一轮课件优化复习(山东专用)人教版必修二《Unit5 Music 》音乐
关注达沃斯主题:30条名言阐释领导力
2016高考英语一轮课件优化复习(山东专用)人教版:专项提能计划——阅读理解(一)
If you have decided to take some English courses in the UK,阅读理解答案
2017最值得一读的新书 中国作家的也入选了!
山东省2016届高三外研版英语单元测试Book4 Module6《Unexplained Mysteries of the Natural World》Word版含解析
Victor was traveling in a train for his parents.短文改错
你有没有毫无用处的超能力?
2016高考英语一轮课件优化复习(山东专用)人教版必修二《UNITS 1~2》
2016高考英语一轮课件优化复习(山东专用)人教版必修三《Unit1 Festivals around the world 》世界各地的节日
山东省2016届高三外研版英语单元测试Book4 Module1《Life in the Future》Word版含解析
山东省2016届高三外研版英语单元测试Book5 Module3《Adventure in Literature and the Cinema》Word版含解析
心理学家告诉你:四招识破一个说谎的人!
山东省2016届高三外研版英语单元测试Book5 Module4《Carnival》Word版含解析
2016高考英语一轮课件优化复习(山东专用)人教版必修三《UNITS 1~2》
山东省2016届高三外研版英语单元测试Book5 Module2《A Job Worth Doing》Word版含解析
2016高考英语一轮课件优化复习(山东专用)人教版必修三《Unit4 Astronomy:the science of the stars 》天文学:恒星科学
2016高考英语一轮课件优化复习(山东专用)人教版必修三《Unit5 Canada-“The True North”》加拿大》“真正的北方”
有关make的习语和表达
多听多看英文原声,掌握5大步骤轻松搞定听力
2016高考英语一轮课件优化复习(山东专用)人教版必修二《Unit1 Cultural relics 》文化遗产
2016高考英语一轮课件优化复习(山东专用)人教版必修四《Unit3 A taste of English humour》感受英语的幽默
2016高考英语一轮课件优化复习(山东专用)人教版:专项提能计划——书面表达(五)
山东省2016届高三外研版英语单元测试Book3 Module6《Old and New》Word版含解析
2016高考英语一轮课件优化复习(山东专用)人教版必修三《Unit2 Healthy eating 》健康膳食
2016高考英语一轮课件优化复习(山东专用)人教版必修二《Unit3 Computers 》计算机
2016高考英语一轮课件优化复习(山东专用)人教版:专项提能计划——阅读理解(四)
山东省2016届高三外研版英语单元测试Book4 Module3《Body Language and Non-verbal Communication》Word版含解析
山东省2016届高三外研版英语单元测试Book4 Module4《Great Scientists》Word版含解析