当前位置:网站首页>Today, Tencent safety and SAIC Group officially announced!
Today, Tencent safety and SAIC Group officially announced!
2022-06-24 16:45:00 【Tencent security】
today , SAIC and Tencent sign a strategic agreement , Announced the joint network security laboratory . Both sides focus on the network security standards and specifications of intelligent connected vehicles 、 Attack and Defense Technology 、 Security research and development 、 Carry out in-depth cooperation in security operation and other fields .
The establishment of the Joint Laboratory , SAIC and Tencent are based on the national strategy 、 Powerful measures to focus on industrial development , It will effectively protect the personal privacy of the users of the Internet connected car 、 Data security . Both sides will carry out vehicle attack and defense against intelligent networked vehicles 、 Security technology research and development , Jointly build network security products ; Integrate network security construction into vehicle R & D and manufacturing process , Improve the network security level of the integration of the cloud management end of the intelligent network connected vehicle .
meanwhile , The joint laboratory will also establish a network security operation system covering the whole life cycle of the intelligent connected vehicle , Fast 、 comprehensive 、 Accurate monitoring, early warning and emergency response , To form an industry-leading network security operation capability of intelligent networked vehicles .
SAIC Group and Tencent will work together to create the user's “ Network security base ”, We will jointly set a new benchmark for the network security industry of intelligent networked vehicles .
SAIC is a leading listed auto company in China , Fully promote the industrial development of electric intelligent networked vehicle technology , Actively lead “ Data determines experience 、 Software defines the car ” Change in the industry , Comprehensive transformation from high-tech products to mobile services .2018 The first network security laboratory and security emergency response center in the industry was established in , At present, we have preliminarily established the remote field 、 near field 、 The network security capabilities of the four types of security scenarios in vehicle and in vehicle , Actively establish differentiated network security technology advantages .
Tencent is one of the leading Internet value-added service providers in China , In digital content 、 Cloud computing 、 big data 、 Artificial intelligence 、 Information security and other fields are in the forefront of the world . Tencent security is in the Internet of things 、 Industrial control 、 Intelligent robot 、 Rich security research achievements have been accumulated in intelligent infrastructure and other fields , With the international leading security automation analysis capabilities . Especially in the field of network security of intelligent connected vehicles , Tencent network security team represented by Cohen lab , Output multiple, like Tesla 、 BMW 、 International level research results of Toyota and other connected vehicles , And for 20 More than 100 vehicle companies provide network connected vehicle safety solutions and expert services .
边栏推荐
- Ui- first lesson
- C. K-th not divisible by n (Mathematics + thinking) codeforces round 640 (Div. 4)
- Audio knowledge (I)
- Comparison of jmeter/k6/locust pressure measuring tools (not completed yet)
- Applet - use of template
- What is cloud development? Why cloud development? Talk about our story
- Popular explanation [redirection] and its practice
- [go] concurrent programming channel
- Cause analysis of the failure of web page live broadcast on demand RTMP streaming platform easydss streaming live broadcast
- What can Lu yuanjiu Jiao buy?
猜你喜欢
![[leetcode108] convert an ordered array into a binary search tree (medium order traversal)](/img/e1/0fac59a531040d74fd7531e2840eb5.jpg)
[leetcode108] convert an ordered array into a binary search tree (medium order traversal)

Ps\ai and other design software pondering notes

Problems encountered in the work of product manager

A survey on dynamic neural networks for natural language processing, University of California

There are potential safety hazards Land Rover recalls some hybrid vehicles

Daily algorithm & interview questions, 28 days of special training in large factories - the 15th day (string)

A survey on model compression for natural language processing (NLP model compression overview)
![[go] concurrent programming channel](/img/6a/d62678467bbc6dfb6a50ae42bacc96.jpg)
[go] concurrent programming channel

Ui- first lesson

C. K-th not divisible by n (Mathematics + thinking) codeforces round 640 (Div. 4)
随机推荐
Try catch finally implementation mechanism
Don't let [mana] destroy your code!
Find out the invisible assets -- use hosts collision to break through the boundary
CDs view permission check
Use Google search like a professional
A survey of training on graphs: taxonomy, methods, and Applications
Is Shanjin futures safe? What are the procedures for opening futures accounts? How to reduce the futures commission?
[web] what happens after entering the URL from the address bar?
Istio FAQ: sidecar stop sequence
What is a server
An error is reported during SVN uploading -svn sqlite[s13]
The TKE cluster node reports an error when executing kubectl
Goby+awvs realize attack surface detection
Ps\ai and other design software pondering notes
中金证券靠谱吗?是否合法?开股票账户安全吗?
[tke] enable CPU static management strategy
Pagoda activities, team members can enjoy a lightweight server 1 core 2g5m 28 yuan for two years
Clickhouse high performance column storage core principle
MD5 verification based on stm32
[leetcode108] convert an ordered array into a binary search tree (medium order traversal)