LINE

Text:AAAPrint
Sci-tech

Chinese hackers display skills at BlackHat, Defcon(2)

1
2016-08-10 09:14chinadaily.com.cn Editor: Xu Shanshan
The BlackHat conference (Photo provided to chinadaily.com.cn)

The BlackHat conference (Photo provided to chinadaily.com.cn)

Chinese hackers have been frequent speakers at the BlackHat conference over the past couple of years. In 2014, two subjects from Chinese hackers were presented at the BlackHat conference; in 2015, the number raised to nine subjects.

This year, 15 top-level hacking technologists from eight Chinese teams of hackers spoke at the conference.

Talents shortage

"Talents shortage has always been a bottleneck to restrict the development of cyberspace security enterprises," said Ma Jie, head of Baidu's security division.

Ma elaborated that there are two aspects included in the issue: the output deficit of the graduates majoring in information security and the disparity between hackers and anti-virus companies on technologies, resources and capitals.

"Most of the cyberspace security companies do not have financial strength to employ and develop professional security personnel," Ma said.

Statistics from Baidu show that there are fewer than 10,000 university graduates per year with the major of information security in China, as opposed to at least 100,000 vacancies to be filled in the industry, and the universities pay more attention to theories than practices.

Xu Chuanchao, cyberspace security engineer at Qihoo 360, told China Daily that the country's existing demand for industry talents is 500,000, while the on-site practitioners' number is less than 50,000. "The supply and demand ratio is 1:10, and by following the trend that the government and enterprises have rapidly paid more attention to online security, the talents shortage will become more obvious."

In addition, most of the newly-graduates can't meet the market requirements for network attacks and practical defense skills.

In July, Government regulators, including Office of the Central Leading Group for Cyberspace Affairs, National Development and Reform Commission and another four ministries and commissions, jointly issued an initiative to foster cyberspace security talents and boost the education development process.

The rising of professional security matches held around the nation, such as GeekPwn, XCTF and WCTF have upgraded talent output efficiency and help alleviate the industry's talent shortage problem to a certain point.

Aims at to enhance the ability of Chinese university students majoring in information security to address real-world security problems, Blue-Lotus took the lead in introducing DEFCON's CTF contest into China before developing it into China's top-level XCTF contest.

Originating at DEFCON 1996, the CTF contest is the leading platform for testing the technical skills of hacker teams when it comes to solving real-world problems in network security.

According Qihoo360's Xu, the company has been jointly worked with the Central Committee of the Communist Youth League of China to conduct cyberspace security education for teenagers for four years.

In addition, by hosting hacker contest and training camp, the company aims at inspiring people's interests in the industry and attracting more people to join in the sector as practitioners.

"Qihoo360 will join Internet Society of China to host the annual China Internet Security Conference (ISC) next Tuesday in Beijing, and we expected to attract more than 30,000 attendees during the meeting," said Xu.

  

Related news

MorePhoto

Most popular in 24h

MoreTop news

MoreVideo

News
Politics
Business
Society
Culture
Military
Sci-tech
Entertainment
Sports
Odd
Features
Biz
Economy
Travel
Travel News
Travel Types
Events
Food
Hotel
Bar & Club
Architecture
Gallery
Photo
CNS Photo
Video
Video
Learning Chinese
Learn About China
Social Chinese
Business Chinese
Buzz Words
Bilingual
Resources
ECNS Wire
Special Coverage
Infographics
Voices
LINE
Back to top Links | About Us | Jobs | Contact Us | Privacy Policy
Copyright ©1999-2018 Chinanews.com. All rights reserved.
Reproduction in whole or in part without permission is prohibited.