On August 9th, the second edition of Qi Xiangdong's personal book "The Loophole", jointly recommended by seven academicians of the Chinese Academy of Engineering, was launched on Dangdang.com.

  "The Loophole", which was first released three years ago, has been at the top of the best-selling list of computer books for a long time.

The release of the second edition of "The Vulnerability" is Qi Xiangdong's upgrade and update of the book "The Vulnerability" after Qi Anxin's listing. It will lead readers to have a more comprehensive, in-depth, and professional understanding of how network security is changing today.

Three years of changes, earth-shaking interpretation of new propositions

  In August 2018, "The Vulnerability" was published.

  Three years ago, Qi Anxin had not yet been listed, and the cyber security industry was on the rise.

The concept of "data-driven security" was mentioned many times in the first edition of The Vulnerability. At that time, the relationship between data and security was becoming the consensus of the cybersecurity industry.

Three years later, the issue of how to more comprehensively, efficiently and securely guarantee network security is no longer just an industry consensus in the science and technology circle, but is becoming a major issue of common concern for the entire society and even mankind.

  In the second edition of "The Vulnerability", Qi Xiangdong uses professional but easy-to-understand language to count the network security incidents that have occurred in the past three years based on his experience in the past ten years. APT organizes and conducts an in-depth interpretation of the new propositions facing the cyber security industry.

Policies and regulations are gradually improved to interpret new ideas

  In recent years, in our country, network security has been elevated to an unprecedented height and has become an important part of the national strategy:

  In 2017, the "Cyber ​​Security Law" was formally implemented; in 2019, the "Basic Requirements for Information Security Technology Cybersecurity Grade Product Security Vulnerability Management Regulations, and the Three-Year Action Plan for the High-Quality Development of the Cybersecurity Industry (2021-2023) (Draft for Solicitation of Comments) have been published one after another... my country's top-level network security design is gradually being improved.

  In the wave of digital reform, network security must also respond to new demands with new methods.

As China's largest listed cybersecurity company, Qi Xiangdong, as the chairman of the group, has personally experienced the entire process of complete national policies and rapid development of the industry:

  In 2019, Innovation put forward the concept of "endogenous security", advocating that security capabilities should be built into the information system; in 2020, based on the "endogenous security concept", an endogenous security framework was designed, which can meet the different needs of business scenarios. Invoke the required security capabilities, build a collaborative network security defense system, and build a secure backplane in the digital economy era.

  In the second edition of "The Vulnerability", Qi Xiangdong reviewed relevant laws and regulations in the field of cyber security, sorted out Qi’anxin’s latest cyber security thoughts, and focused on the origin, basic composition, key elements and future trends of the cyber security field. Summarizing and thinking, let readers understand the rapid changes in today's network security.

  In the digital world, security is an eternal topic.

If you want to talk about network security, you must clearly explain the loopholes; if you only talk about loopholes, you don't know what to say.

Talking about network security starting with "The Vulnerability" is not just advancing with the times, but also not getting out of date.