[51CTO.com original article] The latest data in 2017 shows that the annual output value of the global cyber black industry chain exceeds 110 billion yuan, and its "profitability" is matched by the scale of 1.6 million black industry practitioners. Many people have begun to feel discouraged after seeing this set of figures, and it seems that fighting against the black industry and fully ensuring business security has become an "impossible task." Recently, the reporter interviewed Chen Shuhua, CEO of Dingxiang Technology, at the 5th China Internet Security Conference (ISC 2017). He gave a more feasible suggestion on how to resist black market attacks, and he also shared with the reporter new ideas on ensuring business security. Risk control models can also be shared?!
Chen Shuhua admitted that people hate the business threats brought by the black industry, such as malicious code, ad placement, spam, transaction fraud, and activity arbitrage, but there is no good way to defend against them. Today's black industry attacks are profitable attacks. The purpose of hackers is not to interrupt the business, but to make illegal profits under the premise of normal business operations. He said that many experts have proposed to defend through the interconnection of big data, but encountered great resistance in implementation. The reason is simple, that is, no enterprise user can safely hand over their data, because data assets are now also the core assets of enterprises. Once the data is stolen or used by criminals, the enterprise will suffer irreparable losses. "So can we change our thinking? We don't need companies to share data, but to share their methods of dealing with business threats. To put it more directly, we need to share their data distribution and control models." Chen Shuhua explained that the sharing of the model does not involve any data, but only the way the data is processed, because companies are very happy to share. So what is the value of sharing a risk control security model for enterprises? Chen Shuhua said that each enterprise has different businesses, different data, different threat methods and means, and different attack scenarios. Therefore, risk control models are ever-changing, and it is difficult for an enterprise to fully understand all risk control models. However, after the enterprise shares it, Dingxiang Technology will reprocess and extract it, extract the core key and make it into a universal model. Through sharing, enterprises can continuously clone experiences and achieve self-evolution, so that they can break through the boundaries of security knowledge and continue to escort the development of enterprise business security. The reporter learned that Dingxiang Technology is building a security model sharing platform, which encourages enterprises to output risk models and share security experience on the basis of ensuring the independence of enterprise business data. "The advantage of this is that when an enterprise user is attacked, he can quickly receive risk warnings and pass on effective risk models to other users of the platform, allowing all enterprises to quickly establish prevention and control capabilities and jointly resist risks. For every enterprise on the platform, the sharing of risk control models can also allow enterprises to continuously input the latest prevention and control experience in the industry, and their security capabilities will continue to evolve iteratively." Chen Shuhua concluded. Uncovering the application scenarios of risk control models Currently, more than 30,000 models have been established on this platform of Dingxiang Technology, covering application scenarios in various industries such as finance, e-commerce, aviation, and energy. Chen Shuhua talked to the reporter in detail about the application scenarios of the risk control model. Taking the Gas Group as an example, as a state-owned energy enterprise of public infrastructure, its business security covers household equipment safety, pipeline equipment safety, equipment procurement platform safety, etc. Each of these subdivided business security requires different risk control models to control. What Dingxiang Technology does is to provide the Gas Group with a security model that best meets customer needs and best fits the characteristics of the industry, so that the enterprise system has robustness from the "architecture" perspective. In the automotive manufacturing industry, there is also a strong demand for security risk control models. For example, a well-known automobile company has achieved online management of all production lines. A production line can produce many types of cars and requires the allocation of various auto parts, which requires the establishment of a risk control system that meets business needs and scheduling logic. Customers like telecom operators have actually established many models locally, but due to the rapid changes in business, many models can no longer keep up with business needs. Dingxiang Technology's rich experience in model building can help telecom operators deploy their businesses more safely and quickly. Business security is business itself During the interview, Chen Shuhua made a statement that impressed the reporter. He said, "Business security itself is the business." This sentence actually embodies his insights into business security gained from working at Alibaba and Tencent for many years. In fact, this is true. Unlike infrastructure security, many enterprise customers do not have a clear experience with infrastructure security. However, business security is different. It almost carries most of the pain points of customers - promotional activities are fleeced, corporate profits do not reach real users, junk accounts are rampant, scalpers illegally grab orders... In Chen Shuhua's view, precisely because business security is directly related to the operation and underwriting of a company's business, countless operators have subtly followed the view that "business security is business" from the very beginning, especially in areas such as e-commerce, finance, aviation, and the Internet where business risk threats are prominent. Unfortunately, not all companies have the capabilities to build various risk control models like Alibaba and Tencent. "A small company does not mean less risk," Chen Shuhua saw this, so he founded Dingxiang Technology in April this year. Through the "panoramic business security risk control system" and tens of thousands of risk control models and billions of shared knowledge on the platform, it helps most companies establish their own business security systems. In the reporter's many years of professional interviewing career, Dingxiang Technology, a company that was established only a few months ago, is considered a very young interview subject. Normally, due to the lack of historical accumulation, the content of such interviews is generally relatively thin, but Chen Shuhua's professional experience and his calm personality, as well as his extremely rich practical experience and accurate vision in business applications, make it impossible to ignore his edge. After the interview, the reporter has a clearer outline of the future development of business security. It is reported that at the Shanghai Cyber Security Week, Dingxiang Technology will also announce a secret plan for the "Double Eleven" e-commerce security. Let us wait and see what kind of territory Dingxiang Technology will open up in the future! [51CTO original article, please indicate the original author and source as 51CTO.com when reprinting on partner sites] [Editor: Zhou Xue TEL: (010) 68476606] |
>>: China Economic and Trade Development Park and Huawei signed a strategic cooperation agreement
The advent of 5G technology promises lightning-fa...
Education is the foundation of a century-long pla...
Cloud computing is gradually gaining favor among ...
On November 25 last year, the European RIPE NCC m...
If you've ever bought a Wi-Fi router, you pro...
If we distinguish by telecommunications scale, th...
iOVZ is carrying out a Double 12 promotion, with ...
HostKvm has upgraded the bandwidth and traffic of...
Using the same 5G network, some users can watch h...
Last year, a manufacturer raised a very interesti...
HostDare released the latest promotion in LET, of...
A Google search for “famous members of Generation...
IoT connection environment In addition to smart h...
With millions of machines and objects connected t...
"Connected World: Smart Homes Are Key to Fut...