Chapter 206: A Void Stroke

There is no doubt that Ye Hua said the most concerned issue of users, in the context of the increasingly highly developed Internet, the protection of privacy and information is becoming more and more difficult, more and more people cannot do without the Internet, but at the same time, more and more people gradually feel that they are exposed to the sun, and it has become a magic weapon for some Internet companies to make profits.

In a sense, access to information is equivalent to access to wealth.

Ye Hua's speech on stage undoubtedly won the favor and resonance of many users, shouting that this is a giant with principles and a bottom line, such enterprises and entrepreneurs are worthy of being respected and deserve to make a lot of money.

However, the smiles of the bigwigs on the scene gradually stabilized. JPG

The thoughts in the hearts of the bigwigs are completely different from those of ordinary users, and when they heard Ye Hua explain this, they were slandering in their hearts: To put it mildly, you Ye Hua is just throwing the pot, and the product has not yet been put on sale.

The bigwigs here also sighed in their hearts, this young man is much more shrewd than they imagined, this kind of person is really difficult to yin him, because he basically doesn't give you the opportunity and conditions to be a yin person.

Ye Hua is indeed a cautious person, but he doesn't mean to shake the pot, even if it is, the pot he threw is strongly supported by all users.

There is indeed a lot of profit to be made here, but Ye Hua will not dig an uncertain pit for himself because of this extra profit, he has more ways to make money, why bother?

It's just that outsiders can't understand it, after all, it's a hell of a man who can understand it.

Ye Hua continued: "The so-called 'zero trust architecture' is a new security paradigm in the era of digital network economy, and the development of science and technology will make us face more and more severe network security challenges, and about 60% of the threats to network security are external attacks. ”

Speaking of this, Ye Hua suddenly laughed at himself: "Insert a little song, our coastline company's network is no longer attacked all the time, I can also tell you that 99.99% of them are from external attacks, and they are ......."

Ye Hua paused suddenly, this is very intriguing, he also said so lightly, he didn't care.

At the same time, many network organizations or hackers around the world suddenly felt a chuckle in their hearts, and even an inexplicable chill, these people were obviously paying attention to the conference, and it was certain that they were the ones who had attacked the network of Shoreline Company.

There are even some institutions and groups of hackers who hurriedly release the news as soon as possible, and quickly withdraw, transfer, etc., without the slightest hesitation.

Ye Hua's words really frightened them, this kind of thing is generally only an expert can see the way, network attack or intrusion, its real superb technology is that the attacked person does not know who the attacker is, and even does not know that he has been attacked or invaded.

And Ye Hua's words just now are very interesting, 99.99% of them are from external attacks.

What does this mean?

The problem is not the problem itself.

Rather, it shows that he not only knows that the company's network has been attacked, but also knows it very specifically, and he suddenly said such a sentence at the conference, just like the United States will issue a report when it encounters the same problem, saying which network here has been attacked, and so on.

It seems that the American network technology is very bad, and it is attacked and invaded at every turn, but it is very wrong to think so.

In fact, when the Americans publish this kind of report, the attackers in question see it very falsely.

A report is made public, which is equivalent to telling the attacker in real money, I know what you did, and specifically refers to the module that was attacked, in what way, and what impact and loss was caused, etc.

And Ye Hua's words at this moment also have the same effect, the implication is that everything you attackers do is within the scope of my monitoring.

It can be seen that this is precisely the embodiment of strong technology, you know, if the technical ability is not strong, it is impossible to even find the other party.

And Ye Hua on the stage still talked eloquently: "...... When faced with complex and emerging network security problems, we start from architectural security, passive defense, to active defense, so as to achieve threat intelligence prediction and finally intrusion countermeasures. Therefore, the proposal and practice of 'zero trust architecture' will become a necessary means to maintain network security. ”

"The essence of the so-called 'zero trust' is actually identity-centric access control, simply put, don't trust anyone, the subject of authentication, authorization, and encryption should only be the user himself, and by default, the access control policy should be a dynamic process, based on the multiple data environments of devices and users for calculation."

"Shoreline's artificial intelligence driving system is based on the 'zero trust' to promote the reconstruction of the security architecture, we are based on Google's 'zero trust security architecture framework' on the basis of continuous improvement, optimization and upgrading, the reconstructed links include identity-centric, business security access, dynamic access control, intelligent identity resolution processing and other security modules, to ensure a reliable solution for identity security confirmation in the context of the 5G era."

As soon as this remark came out,The same people forced the official to die,Google is very hurt,It's been in this field for almost ten years,Before Ye Hua talked about the "zero trust architecture", Google's people were very hilarious,Ye Hua, a big coffee in the technology industry, is so wildly blown,Of course, I'm happy to die,Once the smile gradually became presumptuous. JPG。

But the goose is now ......

Google's smile faded again. JPG

"Zero trust architecture is a major systematic project in the use of network security, it cannot be achieved overnight, which requires the improvement of security planning first, gradual migration, management rights and responsibilities matching, use habits to adapt to multiple areas and other steps to complete, I am proud that we believe that the coastline company has been enough to provide a set of solutions in the context of the 5G era and the era of big data, I believe that the program is also an important part of today's conference, do not confirm the network security architecture scheme of the unmanned autonomous driving system, I believe that the implementation of unmanned driving is an extremely irresponsible behavior for the safety of the lives and property of users and consumers. ”

At the end, Ye Hua faced the audience and bowed slightly under the focus of many eyes and lenses.

The audience once again burst into warm applause, and the calibration conference of the developer's technical system plan also continued as Ye Hua walked off the stage to his seat, and the next thing was the real highlight.

Today's vote on the calibration plan will determine the establishment of the standard for the future unmanned autonomous vehicle system, which is the establishment of the standard system implemented by Huaxia people as a global leader in the automotive field in the history of the Chinese people.

It can be said that Huaxia or Ye Hua and the coastline company are undoubtedly the biggest winners present, and the super-first-class enterprises sell standards, not to mention not one or two, but a set of systematic standard solutions are established in a packaged manner.

This is either not to do it, if you want to do it, you will do the rhythm of "family bucket", yes, this is very strong.

All parties are very emotional, after today, Ye Hua and Shoreline Company are about to become the spiritual leaders of the global automotive industry.

This may be a miracle that is difficult to be copied, or even impossible to be copied, to be an outsider in the automobile industry, but to become the spiritual leader of the industry, if it is not happening, I am afraid that no one will believe it, a thousand sighs, but sigh that the power of technology is really strong.