“Talent is both saturated and lacking.” An industry insider so evaluation of the status quo of the security industry, the top talent shortage, the lower talent saturation. Under the strict management of the national information security major, there are not many talents with information security training in China. However, under such inadequate resource conditions, a number of top security people were still born. When the change in the security field came in a gentle but powerful way, they walked out of the campus and devoted themselves to the mysterious wheat field of network security. If the enterprise can be divided according to the strategy, then the “people” in the enterprise can also be analyzed according to some characteristics. The relevant executives are sorted out and classified according to the urban areas where their undergraduate institutions are located, and they are roughly divided into seven factions: Xi ‘an, Hefei, Harbin, Shanghai, Hangzhou, Wuhan and Beijing. The students cultivated by universities in these cities are scattered in the safety circle of various fields. Seven schools, or research, or scientific research, or management, or investment, or strategy, become a hot entrepreneurial legion, also become the incubator of many technology executives. In the journey to the top of China’s network security, they have sweat and tears, have ideals and highlights, in the security of this motif, constantly polished, tempered, to inject the power of The Times for security.


One, to introduce the 20 big guys?

Xi ‘an: Xi ‘an Jiaotong University, Xi ‘an Electric University, Xi ‘an University of Technology

Zhou Hongyi, chairman and CEO of 360 Group

Zhou hongyi graduated from xi ‘an Jiaotong University with a bachelor’s degree in Computer science and received a master’s degree in System Engineering from the School of Management.

When Mr. Zhou emerged in 1999, he came across as more of a technologist.

The company he founded, 3721, provides users with Chinese Internet services. Users can directly enter their Chinese names in the browser address bar to access enterprise websites or find enterprise and product information without having to memorize complex domain names.

He led 360 to go public on the New York Stock Exchange of the United States, and then returned to A shares from the PRIVATIZATION of the United States. Two years later, “360 Enterprise Security” changed its name to “360 Government Enterprise Security”. Under his leadership, 360 gave birth to numerous network security giants.

At the age of 15, I was determined to be engaged in computer, and was recommended to be sent to the Computer major of Xi ‘an Jiaotong University. From selling anti-virus cards during school to leaving Founder of Peking University and establishing 3721; From become China Yahoo president, to change the Internet pattern of 3Q war; From free antivirus to 360 successfully listed in the United States……

Zhou hongyi grew up through a combination of the rise of the Chinese Internet and personal luck, fueled by an obsession and love of computers.

Zhou Hongyi, who described himself as a “little red flower in an orderly society” as a child, has spent more than 30 years in the Internet industry and now runs a vast network security empire.

Cyberhero CEO: Tan Xiaosheng

Tan Graduated from Xi ‘an Jiaotong University in 1992 with a major in computer application in the Department of Computer Science and Engineering.

Technical background, extensive, but extremely rich experience.

During the university, as the second author of the “Practical Technology of Disk Encryption and Decryption”.

After that, I started my own business and worked on program development, RESEARCH and development management, project management, operating system, system integration, and even sales. I became the vice general manager of sales in south China.

Since 2003, he has served as director of Technology Development at 3721, chief Technology Officer of MySpace China, chief Operating Officer of MySpace China and chief Technology Officer of Yahoo China.

In the security circle for more than 20 years, based on the familiar knowledge of various positions, Tan Xiaosheng is adept in the construction and management of technical teams and personnel training.

Although he is not named as his mentor, He is widely used in Internet companies such as Tencent, Alibaba and Sina, and is known as “President Tan”.

In July 2009, he joined qihoo 360 at the invitation of zhou Hongyi, his alumni, and became the brothers fighting side by side with Zhou Hongyi and Qi Xiangdong.

At 360, Tan Xiaosheng does not have a fixed Title. He has been in charge of a variety of businesses, and served as strategic investment director, vice President, chief Privacy Officer, deputy general manager, chief Security officer and other positions. He was also named “Fire Chief” because he was repeatedly ordered to solve urgent emergencies.

During the nearly 10 years, 360 ushered in A high-speed period of development, experienced A series of actions such as listing in THE New York Stock Exchange, completing privatization and returning to A-share market. In 2019, Tan xiaosheng, who left 360, founded Cyber Yingjie and turned to be an incubator for security companies.

Because it is aware of several major problems in the security field:

First, the network security industry is extremely fragmented, so the innovation point is extremely rich; Second, too many entrepreneurs are technology-oriented or product-oriented, and ignore business management.

Tan Xiaosheng therefore founded zhengqi College, security entrepreneurs to provide training and consulting services, from the perspective of industry condensed resources, so that domestic security companies less step pit, reduce the rate of death, stable development.

Tencent vice President: Ding Ke

Ding Ke, vice president of Tencent and head of Security at Tencent, graduated from Xidian University and is a famous security expert in China.

Prior to joining Tencent, he worked at Cisco China and Lucent Technologies with outstanding achievements.

He joined Tencent in 2003 and served as the first person in charge of nine major business departments of Tencent. He is one of the founders of several product business lines of Tencent.

At present, Ding Ke is responsible for Tencent security business covering wireless security, desktop security, cloud security, industrial security and other security businesses.

They want to build Tencent’s security brand through business strategy integration.

Ding Ke under the leadership of Tencent security joint laboratory, its seven security laboratories to attract scattered rivers and lakes of the hacker tycoon.

The people at the helm of 7 LABS were the top 7 “white hat hackers” in China at that time — Ma Jinsong, Li Xuyang, Li Wei, Wu Shi, Yu Yang, Yuan Renguang and Dong Zhiqiang. They built the security fence of Tencent together.

Ali Yun: Wu Hanqing

Wu Hanqing, he has many other names, such as Thorns, Aullik5, Gale, Daoge, Xiaohei, but he is best known as “Daoge”.

The top white hat of China’s young generation, whose experience captures the imagination of the talented and high achievers.

At the age of 15, Wu hanqing entered the children’s class of Xi ‘an Jiaotong University. In 2001, at the age of 16, wu founded the Phantom Tour.

After graduation, I applied for Ali. At the age of 23, I became the youngest senior technical expert of Ali. I participated in the establishment of the application security system of Alibaba, Taobao, Alipay and Ali Cloud, and I have experienced ali security from scratch to strength.

In September 2012, Wu Hanqing left Ali and joined the Startup team of Baoanbao as vice President. In September 2014, Ali acquired the business and products of Anbao. wu Hanqing returned to Ali and shouldering the security burden of Ali’s “Cloud Shield”.

In 2015, Ali Cloud security team led by Wu Hanqing successfully defended against the largest HTTPS SSL/CC attack in the history of the world’s Internet, with the total attack volume reaching 500 million requests, making it famous for a time.

At the age of 32, he became the first person selected for TR35 in the field of Internet security in China.

In the era of video Internet of things, the security of the physical world and the security of the virtual world are intertwined and inseparable.

Wu Hanqing also moved from the virtual world to the security field of the physical world. Three years ago, Wu Hanqing was ordered to set up A group in Ali cloud, from Ali network security guardian became ali cloud A group leader.

Know chuangyu CTO&COO: Yang jilong

Yang Jilong, CTO and COO of Chuangyu, graduated from Northwestern Polytechnical University.

When he was a teenager, Yang jilong was obsessed with fantasy movies and science fiction magazines. When he first touched a computer in high school, he had a direction to go.

It is reported that he has won the provincial award of Sichuan province in the National Computer Youth Olympic Program competition.

In 1998, Yang was admitted to the Computer department of Northwestern Polytechnical University and began his career with computers.

At that time, there was no concept of information security in China, and there were few related majors. Yang jilong taught himself by interest.

After graduating from college, Yang joined Lvmeng Technology co., LTD., responsible for product research and development. In seven years, he witnessed lvMeng grow from a small company with dozens of employees to a large company with thousands of employees.

Then he left the green League, and with a like-minded friend Zhao Wei, founded today’s Know chuangyu.

“Cool” refers to the domestic cognition of Chuangyu. There are many stories about chuangyu in the industry, such as the CEO Zhao Wei, whose name is ICBM, who calls himself “a shining flower in the loophole mining industry”.

In starting a business, Yang Jilong has a lot of unique understanding of the market.

He boldly said that “many CTO are megalomaniac, I also walked this way”, he summed up the demand of the five horse map, triggered a hot discussion in the security circle, he said that “hammer more experience more, better than others that is to be hammered worse than others”, said the bitterness behind the entrepreneurship.

Yang Jilong is not only one of the authors of China’s original information security classic bestseller “Network Penetration Technology”, but also a core member of the well-known security organization XFOCUS. He is good at vulnerability discovery and security software research and development, and has found a large number of AIX, Solaris, HP-UX vulnerabilities.

“Cyber security will be a long-term thing to do.”

The boy who fell in love with computers when he first touched the hard shell of the computer industry should still be around.

Hefei: University of Science and Technology of China, Ann Medical University

Deeply convinced CEO: He Chaoxi

He chaoxi graduated from University of Science and Technology of China in 1998 with a double bachelor’s degree in automatic control and economic Management.

He joined Huawei after graduation and worked in research and development. He left the company in 2000 to found Shenconvincing with two other students and served as CEO.

From the inception of the deep conviction, he Chaoxi has been constantly achieving breakthroughs.

In the early days, he realized that the relatively single R&D team could only make the company a single product manufacturer, so he chose a path of “subdividing products and adding combinations” to make the R&D team break through the single product.

After that, they avoided traditional markets such as switches and focused on solving the core problem of “how to carry out critical business applications faster and more safely under the existing network conditions” for enterprises to conduct differentiated competition.

He Zhaoxi believes that cloud computing, whether enterprises are chasing it or resisting it, is destined to be an inevitable step in the digital transformation of enterprises.

In order to meet the diversified needs of enterprise cloud, Shenconvincing has long started to layout and research and development, and constantly layout of various cloud computing product lines.

During the period, deep convincing many times at an amazing speed, in a few years time quickly cut into the safety market.

In May 2018, He Chaoxi led Shenconvincing to go public on the Shenzhen Stock Exchange.

From three people to about 4,000 people today, he Chaxi has witnessed the development of China’s network security and cloud computing for 21 years.

360 chief scientist: Pan Jianfeng

Pan jianfeng was admitted to the Automation Department of University of Science and Technology of China in 1999.

It has been said that Pan jianfeng used the Western Library of HKUST as a home away from home when he was a university student, and this low-key style continues to this day.In 2004, the virus spread, an anti-Rootkit security tool IceSword tool came out, in the detection system Trojan back door ability to let the industry is amazing, almost everyone in the foreign IT industry.

To what extent? At that time, the Korean drama Ghost, which mainly featured members of the Internet investigation department, used IceSword.

And Pan Jianfeng, is the independent author of IceSword, called “Pan God”, nickname PJF.

In 2017, 360 discovered about 600 vulnerabilities, many of which were excavated by Pan’s Iceblade Lab.

At first, Pan Jianfeng was in charge of the two core businesses of 360’s main defense and engine. They developed an automated vulnerability mining system for Windows — Digtool.

It does not need to be based on source code to complete vulnerability mining, but also can realize automation, mass work.

At a time when white hats were mostly looking at code with the naked eye and digging holes in it, the frame was quite magical.

That’s why his team has been working on Digtool: A Virtualization Based Framework for Detecting Kernel encryption was selected for USENIX Security, one of the top four conferences in information Security.

Pan is also one of the first experts to be hired by the National Information Security Vulnerability Database of China, and has developed several national defense projects and sub-projects of the National “863 Program”.

Tencent Security: Teacher of TK

Yu Yang, known as “TK master”, the head of Tencent Security Xuanwu Laboratory, an internationally renowned white hat hacker.

There is no lack of gods in the safety circle, nor is there a lack of legends. Regarding “Gods + legends”, Yu Yang’s experience still ranks top.

In the security circle, most people’s non-professional training, at least in the field of IT or science and engineering, but in Yangyang’s professional, and “hacker” far away.

Yu Yang graduated from Anhui Medical University. TK, a medical student, is respected as the “master of gynecology” in the hacker circle. I heard that yu Yang was still practicing in the hospital when he found the first vulnerability. Later, the hacker community’s meng Yang used one night to solve the problems that were not solved by several big guys in the domestic security circle.

During the 2008 Beijing Olympic Games, Yu Yang served as the Ministry of Public Security Olympic Information network security command technical expert, is the ORIGINAL designer of CISP certification “malicious code” this course, but also Microsoft vulnerability mitigation technology bypass reward us $100,000 prize one of the two winners worldwide.

Since then, Yu Yang has gradually become known as TK.

In 2016, Yu Yang was the only Asian to be nominated for the Pwnie Awards’ Most Innovative Research Award in the past decade. After joining Tencent, Yang established Tencent Security Xuanwu Laboratory.

The mission/task of Xuanwu Laboratory has two: on the one hand, to release the security research results, on the other hand, to support the security of Tencent’s whole series of products.

His research direction focuses on the mining, utilization, detection and defense of various types of vulnerabilities, as well as the complex security risks involving hardware and wireless.

Cloud Deep Internet CEO: Chen Benfeng

Chen Benfeng, founder and CEO of Cloud Deep Internet, is also a self-taught network security non-training class.

In 1998, Chen benfeng was admitted to the Department of Electronic Engineering of University of Science and Technology of China (USTC) with the third place in the university entrance examination. After entering the university, he taught himself software programming and won the first place in the software competition of USTC.

In 2003, Chen benfeng was admitted to the Department of Computer Science of Hong Kong University of Science and Technology, under the guidance of Professor Vincent Shen, chairman of WWW, founding chairman of W3C Hong Kong, founding Director of Computer Science Department of Hong Kong University of Science and Technology, and Chief Scientific Advisor of Hong Kong SAR Government. Developed the international patent technology of “Custom Rendering of Web pages on mobile devices”, and published a number of top international academic papers.

After graduating from graduate school in 2006, Chen received an offer from Microsoft to work at its U.S. headquarters.

At Microsoft, he joined the core team that developed Internet Explorer, where he experienced the painstaking process of coding and the painstaking pursuit of detail.

Under the guidance of Christian Fortini, the leader of browser technology and the founder of IE kernel dynamic engine, he jointly developed the world’s first GPU hardware accelerated HTML5 rendering engine, which revolutionized the HTML5 user experience. While working at Microsoft, I developed IE404 page and successfully released IE8, IE9 and IE10.

In 2012, Chen benfeng returned to China to found and serve as CEO of Cloud Deep Internet, focusing on zero-trust SDP.

According to Chen benfeng, the security concept of zero trust, which is based on authentication, device authentication, network isolation and access control, is the key to protecting and managing applications and data.

Harbin: Harbin Institute of Technology, Harbin Project

Antian Group: Xiao Xinguang

China’s network security, one person has to mention, he is The chief technical architect of Antian LABS, one of the main founders of Xiao Xinguang, online name Jiang Haike.

Born in Changchun, he has devoted his whole life to northeast China.

In 1993, Xiao was admitted to the Control Engineering Department of Harbin Institute of Technology.

Xiao xin-guang’s relationship with network security began in 1994, when he entered the security circle out of interest in computers, and then went on to become a major player in anti-virus technology, data recovery, and NOVELL.

For network security, he has his own unique insights.

In 1997, Xiao Xiguang began to jiang Haike as a pen name, in the computer terminal security, data recovery, anti-virus and other aspects of the science of writing a large number of articles, in the early chaotic era of China’s network security, at that time for the user security, industry publicity brought a lot of light. In 2000, Xiao Xinguang founded Antian Laboratory with the spirit of geek and has been the chief technical officer ever since. Antian started with the laboratory model and began its commercial transformation 10 years later. Xiao Xinguang himself has been working on the front line of cyberspace security for more than 20 years. The AVL SDK anti-virus engine and support system, large-scale malicious code capture and analysis system developed by him have been widely recognized by the industry, and he is a leader in the APT attack analysis field in China.

“He impressed me with two things: one is the pursuit of original technology, the other is the national industry feelings.”

This is the evaluation of xiao Xinguang in the industry.

Now, he is in the Antian Group, as the national team of network security undertook China such as the Olympic Games, manned space, lunar exploration project, space docking and other major network security tasks, has seven RESEARCH and development centers, monitoring and early warning capacity covering the whole country, products and services radiation many countries and regions.

He is also one of the principals of the national 863 Program, responsible for and involved in a number of national scientific research projects, and personally won a ministerial first prize for scientific and technological Progress.

In the name of engineer, he participated in and witnessed the complete transformation of anti-virus and anti-malicious code technology.

Du Yuejin, chief security Officer of 360 Group

When 360 announced the post of chief security officer, it caused a wave in the security circle.

Due to the protagonist Du Yuejin, in the network security arena for more than 20 years, in the security circle is widely known.

Du Yuejin studied at Harbin Institute of Technology for ten years. He later said that the simple and rigorous style of Harbin Institute of Technology had a great influence on him.

Du yuejin is not a network security major, took this road by accident.

As a student, he worked as a builder and administrator of the university network. At that time, the mail server, domain name server and BBS server of HIT faced daily cyber attacks. Realizing the widespread need for security, he fell headlong into the security circle after his PhD in 1999, and has been there for more than 20 years.

He realized that network security minority, adhere to is not easy, once founded the “East China Network security Festival”, to help people in the industry firm heart.

He calls those who work in cyber security, including himself, “fools,” saying they have faith, perseverance and the ability to endure hardship.

“Life comes for a big thing, and my big thing is China’s cyber security,” he once confided.

Du Yuejin also has a magical quality as a prophet.

As early as 2004 began to study and call for attention to phishing, 2005 put forward the concept of botnet, 2006 systematically emphasized domain name security, 2007 began to call for industrial security, early to the security threat perspective……

These have been verified and valued later.

He also participated in the implementation of the Cyber Security Law and its formulation.

In the system, he stood in the view of the decision makers of the relevant government agencies, to start large-scale worm, large-scale Trojan, botnet and other security incidents involving a large number of users. Now into the network security combat front, Du Yuejin combined with its research, technical reserves and experience for enterprises and users of the ultimate interests of escort, committed to solving a security pain point.

“I’m going to be doing this for at least 30 years.”

Once with lofty ambitions of “today bright”, safe river’s lake road will be through the career of this life.

CEO, CTO: Jiang Qianqian, Yao Jiwei

The company’s CEO, Jiang Xiangqian, and CTO, Yao Jiwei, both graduated from Harbin Engineering University with a degree in computer science and technology.

In 2006, under the upsurge of university information construction, Jiang Qianqian chose to stay in the university after graduation and participate in the university information construction with excellent grades.▲ An Core network shield CEO Jiang Qianqian

During this period, Jiang xiangqian became more and more fascinated with information security, and in 2009 he quit his job and moved to Beijing, where he and his friend Yao Jiwei co-founded Bairui Information Security Laboratory.▲ An Xin net shield CTO Yao Jiwei

At the beginning, under the background of 100,000 virus outbreak units, the anti-virus technology on the market was not efficient, and the unknown threat could not be detected. Based on this, Jiang and Yao developed the first generation unknown threat file detection system based on dynamic code execution analysis based on the behavior detection of anti-virus virtual machine. This software in the international four major evaluation institutions VB100 evaluation report in the world’s second, the first domestic results.

Hit by free anti-virus software, Baysharp did not achieve eventual commercial success.

In 2011, Jiang Qianqian founded the Internet Fast bird, which was invested by Baidu. Jiang Qianqian also served as baidu’s chief mobile security expert.

Ten years later, the two comrades started their second joint venture.

In 2019, Anxin shield was born, focusing on the development and management of intelligent memory protection system.

At present, Based on hardware virtualization and other cutting-edge technologies, Anxin shield has launched anxin Shena intelligent memory protection system, system information detection platform and unknown threat file detection platform three types of security products and security services.

Shanghai: Fudan University, Tongji University, Shanghai Jiaotong University

Tencent security: Wu Shi

Tencent security Cohn lab director Wu Shi, graduated from fudan University mathematics department.

He fell into the cyber security trap in college because of the “bug” fun.

After graduation, Wu shi provided security holes for Wangwang and QQ. At that time, he found a loophole, if the hacker master, as long as the other side wangwang send a message, you can completely control the host of the other side, very powerful. Mr. Wu has also received public thanks from Alibaba.

As a loophole hunter, Wu Shi has revealed a sharp light.

In 2007, Wu was invited to join Microsoft and then wang qi invited him to join the Keen Team. During that time, they discovered the UAF vulnerability, which made Keen Team a big hit at Xcon, one of China’s leading hacker conferences.

This led to Keen Team winning tens of thousands of dollars in prize money at the Pwn2Own Mobile Competition in November that year, using two different poses to beat Safari.

Soon after, Tencent extended an olive branch to them, and the core members of the Keen Team, including Wu shi, joined Tencent to form the Cohen Lab.

At present, their main task is the international mainstream operating systems, Internet and mobile Internet applications, cloud computing technology and Internet of things equipment cutting-edge security attack and defense technology research.

Qiming star Group CEO: Yan Wangjia

Yan Wangjia, also known as Wang Jia, was one of only four science students admitted by Fudan University in Yunnan province that year.

After graduating from Fudan University in 1990 with a major in computer software, Yan wangjia went to the United States to study at Moore School of Electronic Engineering, a prestigious school of engineering and Applied Science.

The school designed the world’s first all-electronic mathematical computer, ENIAC, in 1946, ushering in the computer age and ushering in the third wave of technology. During her study, Wang Jia Yan was responsible for the construction of the Wharton global networking platform of the Wharton Business School and the security of data and systems. During this period, Wang Jia Yan accumulated a lot of experience in network security and management.

She received her PhD from the University of Pennsylvania in 1996, the same year she returned to China to found Qiming Star and became CEO.

At that time, the Internet was just emerging in China, and there were few talents in the field of information security. Since then, Yan Wangjia, 27, has become one of the few female vigilantes in the field.

In that forest, her friend please the tsinghua university, beihang university and Chinese Academy of Sciences, in collaboration with the state information center, the international computer security association, has edited as the foundation of network security, network security architecture design, the computer network security tools, the selection, configuration, installation and maintenance of the firewall, “the matrix analysis and prevention technology, network security, such as books, Fill the domestic gap.

In 2008, she led Qiming Stars to shoulder the responsibility of network security during the Olympic Games.

In more than two decades, her company has grown from a relative unknown to the country’s leader in cyber security.

Tongji University: Ji Xinhua

Ji Xinhua, head of UCloud, graduated from Tongji University majoring in electrical engineering automation control.

Ji Xinhua is also a legendary figure, one of China’s first generation of hackers, known as the “computer genius”, is regarded as the “godfather hacker” in the industry, and was one of only four private cybersecurity emergency experts at the Beijing Olympics.

In 1996, his family was not rich when he first touched the computer in the university computer was deeply attracted, from then on, this magic computer and network, opened another window for him. After catching up, he was quickly promoted from a computer illiterate to an Internet expert. At that time, he was a representative of “China’s first generation of hackers” who could crack all the Internet systems of the time.

Since his junior year in college, Ji xinhua has tried his hand at the Internet world. He started his own business and founded “Alalshanghai” review website, 4E website and security company for three consecutive years. After the security company was acquired, ji Xinhua joined Huawei in 2002. Two years later, he entered Tencent, which was not big at that time, and was responsible for the security work. Because he was on duty for the company all the year round, he got the title of “chief duty officer”.

In 2009, ji xinhua joined Shanda at the invitation of Chen Tianqiao. He was vice President of Shanda Online, Chief Security Officer and CEO of Shanda Cloud. He was fully responsible for the research and development and management of Shanda Cloud computing platform. He has rich experience and profound insights in cloud computing and network security.

In 2012, Ji xinhua left Shanda and started to build his own cloud computing company called UCloud together with his friends Mo Xianfeng and Hua Kun. UCloud was listed on the Science and Technology Innovation Board of the Shanghai Stock Exchange in 2020.

Hangzhou: Zhejiang University

Chairman of Deeptech: Zheng Shusheng

Zheng shusheng graduated from Zhejiang University.

This low-key and elegant zhejiang University person, with his magnificent life experience, added a lot of legendary color to him.

At first, after graduating from Zhejiang University with a PhD in communication and electronics, Zheng Shusheng was faced with the choice of teaching in the university or joining a company. He declined the university’s efforts to persuade him to stay and went to a small company founded only five years ago.

During that time, the company has gone from obscurity to fame, and he has grown with the company to the top management, which is Huawei.

Li Yinan is well known, but Zheng Shusheng is less known. In fact, Li Yinan and Zheng Shusheng are the same huawei Whampoa phase, are the official to vice president, with ren Zhengfei successor candidate.

At the critical moment when Huawei was facing internal and external problems, Zheng Shusheng was appointed to create H3C single-handedly. In six years, H3C equalled cisco, the leader in the network market and the domestic market. During this period, H3C’s sales increased by 15 times, from 600 million yuan to 10 billion yuan.

In 2012, Zheng Shusheng resigned from Huasan Communications and became the chairman of DeepTech.

It is A high-tech enterprise integrating research and development, production and sales in the field of network, security and application delivery. It was listed on the A-share market in 2019.

It is worth mentioning that zheng Shusheng had chosen to start his own business in two of the three segments of the field, one is Yushi, security market exploration, one is Hongshan technology, storage field of quasi-unicorn.

Zheng shusheng has been at the forefront of the industry for 28 years.

“To do a thing, you need to focus on doing a good job, and then let nature take its course. Looking back on his career, has been close to the year of the destiny of Zheng Shusheng so answer.

Changting TECHNOLOGY CEO: John Chen

A graduate of Zhejiang University, Chen, like many of the best in the information security world, has no training.

He majored in computer science and technology at a time when information security was not an independent major and was not particularly valued, and he was driven by curiosity to enter the door of network security.

At that time, in order to train students’ practical experience, Tsinghua university professors Duan Haixin and Zhuge Jianwei carefully created a “Blue-Lotus” team, where John Chen became close to Yang Kun, Zhu Wenlei, Liu Chao and others.

In 2014 and 2015, Blue Lotus almost won the top three of all the heavyweight network security competitions in the world, and it is also the first Chinese team to enter the DEFCON CTF (Hacker World Cup).

In DEFCON CTF, the international top security competition, blue Lotus and 0OPS team won the second place in the world. Then CTF was brought to China and the largest BCTF competition was held in China.

The “Blue Lotus” grew into a well-known offensive and defensive team.

In 2014, when he was about to graduate, John Chen, who was obsessed with CTF competition, Yang Kun, Zhu Wenlei and Liu Chao decided to start their own business immediately, and Changting Technology was born.

Since then, in many competitions at home and abroad can see the figure of Changting technology.

Among them, he broke three major operating systems in Pwn2Own International hacker Competition and broke several devices in GeekPwn hardware cracking competition and won the first prize for many times. He has won DEF CON CTF global runner-up, the first prize of the national “strong net Cup”, the first prize of the capital network security Day network security technology competition, the first prize of the China network security technology competition.

Wuhan: Wuke University

Mo an Technology CTO: Wei Xingguo

Wei Xingguo, also called Yun Shu, is also a well-known security circle of white hat experts.

He was admitted by Wuhan University of Science and Technology in 2000, majoring in International Economics and Trade.

Similar to Ji xinhua, he was also the first time to contact with a computer after college, and started the journey of network security.

While others play games in the Internet bar to forget eating and sleeping, Yun Shu taught himself computer in the Internet bar day and night.

In the next 15 years, Yunshu worked for Green Alliance, Yahoo and Alibaba.

The technology Titan became one of the main designers of Ali cloud computing security and Ali Cloud Shield.

During the four years from 2009 to 2013, he was exposed to the most cutting-edge cloud computing security at AliYun. At that time, cloud computing was in the opening period, without previous guidance, cloud computing security was fumbling and struggling in the undercurrent.

Then in 2014, Ali Cloud through the pain, ushered in product and profit double happiness, and became the star business of Ali, as one of the founders of “Cloud shield”, Yunshu has also become a pioneer in the field of domestic cloud security.

In the same year, Yun Shu transferred from Ali Cloud to The Security department of Ali Group, developed risk control and hacker intelligence, once launched the effect is happy.

In 2016, has left Ali cloud shu and former Ali cloud platform director Nie Wanquan, former Alibaba senior security expert Wang Lihui joint venture, founded moan technology.

Moan is committed to integrating threat intelligence technology and artificial intelligence technology into enterprise security defense system, providing enterprises with overall security solutions in the era of cloud computing and IoT.

He explained: “If you stand on the shore and point at the people who are planting rice in the field and say they are in the wrong position, no one will pay any attention to you. But when you roll up your pants and jump into the water yourself, mud on your feet and sweat on your head, what you say is persuasive and valuable.”

Beijing: Tsinghua University, Peking University

Peking University: Zhuge Jianwei

In 1997, Zhuge Jianwei was admitted to Peking University, majoring in computer science. He studied for nine years. In 2006, he graduated with a doctor of Science degree.

Online Ghosts: Autobiography of The World’s Leading Hacker Mitnick, translated by Zhuge Jianwei, as well as his own books, Technologies and Practices of Network Attack and Defense, and Metasploit Infiltration Testing Devil Boot Camp, have become the most common pre-work books for the new generation of hackers.

He then moved to Tsinghua University, where he devoted himself to cyber security.

In December 2010, duan Haixin and Zhuge Jianwei, professors of Tsinghua University, created a team of “Blue-Lotus” in order to give students practical experience.

Under the leadership of Zhuge Jianwei, the blue Lotus team, which implies the traditional hacker and competitive spirit of freedom and never fade, continues to break records and move to the international stage.

He also founded the XCTF International Cyber Attack and defense League, which later became the no. 1 attack and defense tournament in Asia.

Jianwei zhuge and hai-xin duan, 2013, three people co-founded the ledge, jianwei zhuge CTO, lead the team to develop the better network security defense combat training system, competition platform, shooting range, large holes data knowledge base and offensive and defensive toolbox mature products, such as forming network attack and defense laboratory, cyber range, etc. Series of solutions, and offensive and defensive talent practice training system, Obtain sales revenue of tens of millions of yuan, and open overseas market.

Tsinghua university: In 2012, tsinghua University established the Institute of Network Science and Cyberspace (HEREINAFTER called The Institute of Network Science). In 2017, it became an independent teaching and research institute, and joined forces with related departments such as computer Science and Electronics. Lead the construction of the newly added first-level disciplines of “Cyberspace Security”, and the construction of the first-level disciplines of “Computer Science and Technology” and “Information and Communication Engineering”. “Education is not the filling of a pail, but the lighting of a fire.

The educational concept of a propaganda board appearing at the door of the dormitory of Tsinghua University virtually pushes tsinghua university’s cyber space security students to move forward.

Tsinghua students are becoming a pillar in the security field. For example:

Green Alliance technology founder and chairman Shen Jiye, Shan Shi Net chairman and CEO Luo Dongping, Yongxin Zhicheng senior vice President and chief strategy officer Pan Zhuting, digital alliance founder and CEO Yang Congan, Core dun founder and CEO Guo Xiaopeng, Zhixiang technology Jiang Tianyi, “Internet security godmother” Dawn Song, Raylai WISDOM CEO Tian Tian; Yang Kun, co-founder of Changting Technology; He Wenjun, founding partner of Yuanqi Capital.

Qing Hua’s outstanding students are scattered like stars in the sky, with love and faith, to protect the field of network security.

conclusion

Sanli pulls the bow and works together

The seven factions, such as the seven soldiers, differ in their experience, skills, strategies and offensively and defensively, but on the long march of network security, they are all committed to the defense of the country.

These college factions are just a microcosm of countless network security people, it is a time across the rhino photo, according to the network security era turbulent undercurrent.

Together with the network security industry, they have experienced the ups and downs of development, with more than two decades to catch up.

Only for that in the world of network security toddlers, grow into today’s network security powers.

Join me to explore more of the unknown world of Internet security

Source: this article content from the network, if there is infringement, please contact us to delete.