success_jsonpCallback({"data":[{"_index":"cms-v1","_type":"cms_new","_id":"67bfcb4ef7ca643ffd787f0d","_score":null,"_source":{"editorid":3940,"keywords":["网络安全"],"authorname":"李雪薇","keywordids":[837],"it168_url":"http://safe.it168.com/a2025/0227/6878/000006878700.shtml","id":6878700,"it168_publishtime":1740622671,"abstract":"风险投资公司Insight Partners证实,该公司遭遇了一起由未指明类型的社会工程学攻击引发的网络安全事件。","avatar":"http://sy0.img.it168.com/article/5/5096/5096625.png","authorid":3940,"title":"风险投资公司Insight Partners确认遭受网络攻击","editorname":"李雪薇","comment_count":0},"sort":[1740622671000]},{"_index":"cms-v1","_type":"cms_new","_id":"67bd2d2df7ca640fa063d6e1","_score":null,"_source":{"editorid":3940,"keywords":["网络安全"],"authorname":"Commvault","keywordids":[837],"it168_url":"http://safe.it168.com/a2025/0225/6878/000006878414.shtml","id":6878414,"it168_publishtime":1740451119,"abstract":"2025年1月1日,《网络数据安全管理条例》(以下简称《条例》)正式施行。《条例》是《网络安全法》、《数据安全法》和《个人信息保护法》下首个国务院正式发布的管理条例,属于效力仅次于法律的行政法规,其重要性不言而喻。","avatar":"http://sy0.img.it168.com/article/5/5095/5095005.png","authorid":3940,"title":"《网络数据安全管理条例》正式施行,企业数据保护合规如何落地?","editorname":"李雪薇","comment_count":0},"sort":[1740451119000]},{"_index":"cms-v1","_type":"cms_new","_id":"67a95f75f7ca6460d5451c11","_score":null,"_source":{"editorid":3940,"keywords":["网络安全"],"authorname":"千家网","keywordids":[837],"it168_url":"http://safe.it168.com/a2025/0210/6877/000006877084.shtml","id":6877084,"it168_publishtime":1739153271,"abstract":"这些技术趋势不仅是渐进的进步,更是能够重新定义行业和社会规范的变革力量。企业若能以前瞻性思维拥抱这些变化,将能够将潜在的破坏性转变为机遇,在快速变化的时代蓬勃发展。","avatar":"http://sy0.img.it168.com/article/5/5087/5087788.png","authorid":3940,"title":"2025年技术趋势将如何改变每个行业","editorname":"李雪薇","comment_count":0},"sort":[1739153271000]},{"_index":"cms-v1","_type":"cms_new","_id":"67972cdff7ca646fea47c1fe","_score":null,"_source":{"editorid":3940,"keywords":["网络安全"],"authorname":"李雪薇","keywordids":[837],"it168_url":"http://safe.it168.com/a2025/0127/6876/000006876728.shtml","id":6876728,"it168_publishtime":1737960673,"abstract":"随着2024年已入尾声,网络安全领域显然发生了显著变革。从开创性技术到不断演变的威胁,组织不得不迅速适应,以保护其资产、数据和人员。在此,我们回顾了2024年塑造行业并注定影响未来安全实践的趋势与创新。","avatar":"http://sy0.img.it168.com/article/5/5085/5085704.png","authorid":3940,"title":"2024年回顾:网络安全趋势与创新","editorname":"李雪薇","comment_count":0},"sort":[1737960673000]},{"_index":"cms-v1","_type":"cms_new","_id":"6797297ff7ca64752123920e","_score":null,"_source":{"editorid":3940,"keywords":["网络安全"],"authorname":"李雪薇","keywordids":[837],"it168_url":"http://safe.it168.com/a2025/0127/6876/000006876726.shtml","id":6876726,"it168_publishtime":1737959810,"abstract":"托管安全服务提供商(MSSP)迈向新高度。鉴于网络安全成本的不断增加,MSSP将越来越被视为一个具有吸引力且成本效益高的选择,特别是对于财政拮据且迫切希望降低网络安全风险敞口的中小型企业而言。这将推动MSSP市场的增长,但也可能掩盖一些客户的网络安全风险要素。MSSP提供的服务通常呈现为黑箱功能,其条款和条件隐瞒了传统安全控制(如独立第三方审计、渗透测试和红队测试)所提供的风险洞察。","avatar":"http://sy0.img.it168.com/article/5/5085/5085700.jpeg","authorid":3940,"title":"2025年网络安全13大预测","editorname":"李雪薇","comment_count":0},"sort":[1737959810000]},{"_index":"cms-v1","_type":"cms_new","_id":"6792f9d7f7ca64158d65a30b","_score":null,"_source":{"editorid":3940,"keywords":["网络安全"],"authorname":"李雪薇","keywordids":[837],"it168_url":"http://safe.it168.com/a2025/0124/6876/000006876537.shtml","id":6876537,"it168_publishtime":1737685465,"abstract":"惠普企业(HPE)确认正在调查IntelBroker威胁组织声称的数据泄露事件。上周,IntelBroker在一个数据泄露论坛上发布声明称,已成功入侵HPE网络并窃取信息,正在暗网上出售这些信息。","avatar":"http://sy0.img.it168.com/article/5/5084/5084744.png","authorid":3940,"title":"黑客组织IntelBroker再掀数据泄露风波,HPE成目标","editorname":"李雪薇","comment_count":0},"sort":[1737685465000]},{"_index":"cms-v1","_type":"cms_new","_id":"6788c311f7ca644b22195a5a","_score":null,"_source":{"editorid":3940,"keywords":["网络安全"],"authorname":"李雪薇","keywordids":[837],"it168_url":"http://safe.it168.com/a2025/0116/6875/000006875891.shtml","id":6875891,"it168_publishtime":1737016083,"abstract":"强大的网络威胁情报(CTI)能力可以在多个不同领域将网络安全计划提升至新的高度。当组织选择与其技术环境和业务背景相关的优质威胁情报来源时,这些外部来源不仅能加快威胁检测速度,还能帮助领导者更好地了解风险敞口,并优先安排未来的安全投资。","avatar":"http://sy0.img.it168.com/article/5/5081/5081126.png","authorid":3940,"title":"停止在无效的威胁情报上浪费钱,需要避免的五大误区","editorname":"李雪薇","comment_count":0},"sort":[1737016083000]},{"_index":"cms-v1","_type":"cms_new","_id":"67862d6ef7ca64364b30221a","_score":null,"_source":{"editorid":3940,"keywords":["网络安全"],"authorname":"李雪薇","keywordids":[837],"it168_url":"http://safe.it168.com/a2025/0114/6875/000006875693.shtml","id":6875693,"it168_publishtime":1736846704,"abstract":"大型语言模型(LLMs)已被证明是发现零日漏洞、绕过检测和编写漏洞利用代码的有价值工具,从而降低了渗透测试人员和攻击者的入门门槛。生成式人工智能对多种业务流程产生了重大影响,优化了工作流程并加速了其执行速度,在某些情况下还降低了专业技能的基线要求。","avatar":"http://sy0.img.it168.com/article/5/5080/5080100.png","authorid":3940,"title":"Gen AI通过普及漏洞挖掘,正在改变网络威胁格局","editorname":"李雪薇","comment_count":0},"sort":[1736846704000]},{"_index":"cms-v1","_type":"cms_new","_id":"677632f9f7ca6456cd4cc238","_score":null,"_source":{"editorid":3940,"keywords":["网络安全"],"authorname":"千家网","keywordids":[837],"it168_url":"http://safe.it168.com/a2025/0102/6874/000006874545.shtml","id":6874545,"it168_publishtime":1735799547,"abstract":"在2024年,网络安全领域经历了显著的变化和挑战。以下是根据最新趋势和行业分析,对网络安全状况的深入探讨。","avatar":"http://sy0.img.it168.com/article/5/5074/5074400.png","authorid":3940,"title":"2024年十大安全状况分析","editorname":"李雪薇","comment_count":0},"sort":[1735799547000]},{"_index":"cms-v1","_type":"cms_new","_id":"6775fd60f7ca642be23d98e8","_score":null,"_source":{"editorid":3940,"keywords":["网络安全"],"authorname":"李雪薇","keywordids":[837],"it168_url":"http://safe.it168.com/a2025/0102/6874/000006874512.shtml","id":6874512,"it168_publishtime":1735785826,"abstract":"2025年,人工智能将加剧2024年已出现的威胁,为网络钓鱼、内部威胁和勒索软件等老旧的安全挑战带来新的难题。","avatar":"http://sy0.img.it168.com/article/5/5074/5074197.png","authorid":3940,"title":"2025年预测:AI加剧攻击威胁,量子威胁增长,SaaS安全困境","editorname":"李雪薇","comment_count":0},"sort":[1735785826000]}],"total":5142})