"Exploring the Security" XIN "" Copper (2) Eight stars gathered and each showed its ability, this safety matrix is not ordinary

Author:Information security research Time:2022.08.25

Explore the "XIN" of Security (2) -The Green League Science and Technology Research Institute

A 64K dedicated line in 1994 has access to the International Internet,

China has grown into a veritable online country.

However, high -quality development and high level safety,

Insteidity.

On China's network security landscape,

There is a 22 -year -old company -Green League Technology.

It has experienced the ups and downs of the security industry,

A number of firsts in the industry is engraved,

He has participated in the RSA conference for 15 consecutive years,

TenWorld Technology Carnival was held for ten consecutive years

Native

When we mention the vocabulary of Tianji, Tianyuan, Tianshu,

I often think of the confusing purple micro -fighting numbers and the deep and mysterious "forecasting";

When we mention the vocabulary such as Fu Ying and Nebula,

It will make people feel a sense of science fiction and martial arts style.

This team's network security laboratory is named after this,

It highlights their original intention and concept of continuous response to cyber security offensive and defense and promoting industry scientific and technological innovation.

Up to now, Green League Technology has built eight major laboratories such as Nebula, Tianji, Tianyuan, Tianshu, Fuying, Parallel, Gexione, and Threat Information.

What are the characteristics of them?

In this issue of the "Exploring Security XIN" column team, entering the Green League Science and Technology Research Institute,

Listen to what the person in charge of the eight laboratory said--

◆◆◆◆med

● Nebula Laboratory (head of Liu Wenyu)

"Focus on the research of cloud computing security, propose a software -defined cloud security protection system, and successfully incubate the Taro's native security platform and solution, developed cloud native offensive and defensive shooting range, and open source code."

● Tianji Laboratory (head of Zhang Yunhai)

"Focus on the research of offensive and defensive confrontation technology, focus on the research of key platform vulnerabilities such as mainstream operating systems, application software, and Xinchuang at home and abroad. Based on Guanji, application security and data security scenarios, it provides the world's most cutting -edge security research capabilities and research results."

● Threat intelligence laboratory (head of Ou Shuai)

"Focusing on the research of threatening intelligence fields, involving Internet space surveying and mapping, global malicious asset mining, hacker threat dynamic tracking, etc., gathers the latest global network security information, and provides users with exclusive intelligence and core data."

● Tianyuan Laboratory (head Li Wenjin)

"Focus on the research of new combat offensive and defensive confrontation technology, provide methods and means to identify risks, and provide decision -making support for threatening confrontation. Elite teams formed by the core members of the laboratory have participated in the top international offensive and defensive competitions and national offensive and defensive drills. High -precision talents reserved in the industry. "

● Tianshu Laboratory (head of Gu Du Jian)

"Focus on cutting -edge technologies for the integration of digital intelligence integration, and use big data and artificial intelligence technology to improve actual combat offensive and defensive capabilities to cope with the security issues brought by the development of technology, leading the industry's first security knowledge map."

● Fuying Laboratory (head Wu Tiejun)

"Dedicated to study the long -term, concealed, advanced APT attacks and directional attacks of hackers at home and abroad. It is a security threat such as identification, monitoring zombie network, and extortion, and constructing a active threat hunting security defense system, studying threat capture, threat discovery, and threat Organizational portrait and organizational attribution technologies can effectively assist state organs to investigate cases. "

● Parallel laboratory (head of Xiao Yanjun)

"Based on network space is the characteristic of parallel space, focusing on parallel simulation, artificial intelligence, digital twin and other technologies to achieve attackers visualization, important digital assets visualization, and then visualized intelligent decision -making command, realize the visual and secure governance of urban -level network space visualization and security governance ","

● Matthew Lab (head Li Donghong)

"Focus on the security research of the three major business scenarios of the Industrial Internet, the Internet of Things and the Internet of Vehicle, take the responsibility of guardianship, adhere to the attitude of the lattice, and be committed to the vulnerability mining and security risk analysis of intelligent equipment, and work with all parties together with all parties. The safe ecology of all things. "

In response to these issues, Fan Dunqiu, general manager of the Green League Science and Technology Capacity Center, decrypts the "martial arts" cheats of the eight major laboratories-

Reporter: After 20 years of industry development, please talk about the original intention and mission of the eight major laboratory construction? Fan Dunqiu: We summarize the mission of the laboratory like this: the best practice of the standard industry, empower the product internally, and lead the innovation of actual combat offensive and defensive confrontation.

We have always paid great attention to the construction of security research capabilities. On the one hand, there are more and more research directions. From the traditional vulnerability research direction, to the industrial Internet, cloud, APT, threat intelligence, AI and other fields; on the other hand, the research team is gradually expanding. Researchers have increased year by year. There will be 200 professional researchers at the end of the year.

From the perspective of product empowerment, we continuously optimize the research system and emphasize the physical operation capabilities of the laboratory. This can better organize the research power internally and help achieve technological breakthroughs in the professional research field.

Reporter: In recent years, international governance of network space has attracted much attention. How does my country's network security team do a good job of "internationalization"?

Fan Dunqiu: The real international security company should be a case of the best international practice in the three areas of strategy, products, and research, and has an international technology brand. In terms of strategy, we are committed to providing an enterprise -level network security solution based on our own core competitiveness worldwide, and internationalization has integrated into our genes; in terms of products, our products have continued to obtain recognition from well -known international consulting agencies recognized by international consulting agencies. , I have obtained the highest -level certification recommendation of NSS LABS, and continued to be selected as Gartner Magic Limits; in terms of research, we have accumulated rich research results through invention patents, papers, and participation in top security meetings.

Reporter: With the network offensive and defensive confrontation and the intensified industry competition, is it "stressful"? How can the laboratory be continuously innovated and promote the productization of scientific research results?

Fan Dunqiu: As the person in charge of the laboratory, it is definitely unrealistic that there is no pressure. In fact, the pressure mainly comes from two aspects: on the one hand, it is necessary to use systemic, practical, and operating to deploy the business and talent strategy of the laboratory; On the other hand, how to implement the results of the results, to truly solve the customer's problem, either solve the customer's current core security problem, or solve the problem of future security practical confrontation.

Reporter: All competitions are in the final analysis of talents. What is the overall atmosphere of the laboratory? What are the mechanisms for retaining talents and cultivating talents?

Fan Dunqiu: Our research content is full of challenges. The research atmosphere is strong, open, and focus on research on talent training and echelon construction. The two founders of the team still insisted on the front line of research, and many researchers who have worked for more than 10 years, and many young people joined the team to contribute new research ideas. All the laboratory uses research results as the researcher evaluation indicator. Special prizes have been set up in technological innovation and ability breakthroughs. The research results with major influence will make bonus incentives and have multiple reward mechanisms for researchers.

In response to the overall strategy of national network security, we have been continuously increasing research and development investment. Adhering to the concept of continuous innovation, we also demonstrate the original intention and mission of the new generation of entrepreneurs in the field of Internet information.

Guangming.com and "Information Security Research" jointly produced

Produced: Zhang Ning, Li Zhengzheng

Coordinating: Pan Jing, Kong Fanxin

Plan: Zhang Xiangzhang, Lingfeng

Case: Pang Yiliang, early morning

Written article: Yu Yong, Lingfeng

Dubbing: Lei Miaoxin

Beautiful editor: Dan Dan

- END -

Sudden!WeChat payment is abnormal and cannot be paid!

Today, when many users take out their mobile phones to order takeaway preparation ...

A formula teaches you to get the scenes of scenes

Edit Introduction: When you are designing product design, you may need to visua...