Strategies for Industrial Control System Cybersecurity

Strategies for Industrial Control System Cybersecurity

In today’s rapidly developing digital age, the security of Industrial Control Systems (ICS) has become an important issue that enterprises cannot ignore. With technological advancements and increasingly cunning cyberattack methods, ensuring the secure operation of ICS is more urgent than ever. Therefore, implementing effective countermeasures is not only a necessary measure to protect corporate assets … Read more

Industrial Control System Information Security Standardization

Industrial Control System Information Security Standardization

Introduction On May 20, 2021, the “2021 Industrial Safety Conference (ISSC2021)” was held in Beijing, hosted by the Industrial Control System Information Security Industry Alliance, supported by the China Automation Society, the Smart Manufacturing Promotion Cooperation Innovation Alliance, the Edge Computing Industry Alliance, and the China Instrument and Meter Industry Association. Over 160 guests from … Read more

Industrial Control System Information Security Insights from NSFOCUS

Industrial Control System Information Security Insights from NSFOCUS

Time Wednesday, July 20, 2016 Location Hangzhou Zhong’an Holiday Hotel The water glimmers when the sun shines, and the mountains appear mysterious in the rain. In mid-summer, the drizzling rain in Hangzhou transformed into clear skies with the arrival of the G20 summit and the Industrial Control System Information Security Summit. On July 20, NSFOCUS … Read more

Explaining Embedded Security in Simple Terms (2)

Explaining Embedded Security in Simple Terms (2)

(Image from Wikipedia entry Caerlaverock Castle: https://en.wikipedia.org/wiki/Caerlaverock_Castle ) In the previous article, we introduced the difference between the two concepts of “security” in Chinese, namely Security and Safety, in embedded systems—Safety is generally understood as “functional safety,” while Security refers to “information security”—to distinguish it from the more familiar “cyber information security.” In the following … Read more

Fault Injection in Diagnostic Protocols

Fault Injection in Diagnostic Protocols

Click the blue text above to follow us / Technical Exchange Group/ Add WeChat 15021948198 to apply for membership to download PPT & join the automotive network information security, testing evaluation, automotive electronics, autonomous driving technology exchange group, recruitment job-seeking group, investment and financing cooperation group… Related Articles [Grab Your Spot] Countdown! The 8th Information … Read more

Beware of Malicious Software Infiltration! Adding a ‘Safety Lock’ to Children’s Smartwatches

Beware of Malicious Software Infiltration! Adding a 'Safety Lock' to Children's Smartwatches

In recent years, children’s smartwatches have become popular among parents and children. However, due to the unique characteristics of child users, the underlying concerns have also attracted widespread attention. Recently, the “Guidelines for the Protection of Personal Information and Rights of Children’s Smartwatches” formulated by the China Cybersecurity Industry Alliance have officially come into effect. … Read more

Beware of Malicious Software Infiltration! Adding a ‘Safety Lock’ to Children’s Smartwatches

Beware of Malicious Software Infiltration! Adding a 'Safety Lock' to Children's Smartwatches

In recent years, children’s smartwatches have become popular among parents and children. However, due to the unique nature of child users, the underlying concerns have also attracted widespread attention. Recently, the alliance technical specification formulated by the China Cybersecurity Industry Alliance, the “Guidelines for the Protection of Personal Information and Rights of Children’s Smartwatches,” has … Read more

Current Status of Automotive ECU Technology

Current Status of Automotive ECU Technology

If we compare the engine to the “heart” of a car, then the car’s “brain” should be the ECU. What is an ECU? How does it work? This article provides a detailed analysis.What is an ECU? ECU has two full names: Engine Control Unit and Electronic Control Unit. It is easy to see that the … Read more

Embedded Security: The Political Logic of America’s Energy Transition

Embedded Security: The Political Logic of America's Energy Transition

Click here to view submission system details SUBMISSION Huang Yunyong (School of International Political Economy, Chinese Academy of Social Sciences) Citation Huang Yunyong. “Embedded Security: The Political Logic of America’s Energy Transition” [J]. International Petroleum Economics, 2025, 33(01): 11-28. Abstract The security aspect of America’s energy transition exhibits “embedded” characteristics. Although the process of energy … Read more