Bu Zheng, the current vice president of Didi Information Security, comprehensively leads the information security team.
"Didi is a representative Internet company. Starting from Didi, we hope to bring positive changes to the security behavior of the entire Internet industry, so that every user around us can enjoy the convenience brought by the mobile Internet revolution and get better daily protection. " Bu Wei said.
Bu Zheng once served as vice president of Huoyan and spoke at the "20 16 Ali Security Summit" hosted by Alibaba Group. In addition, he has made many speeches at various top international security conferences.
Chinese name: Buzheng
Nationality: USA
Occupation: Vice President of Didi Information Security
Graduate school: Beijing University of Posts and Telecommunications
Masterpiece: OperationBeebus
Personal hobbies: running, mountaineering, badminton.
Main projects: network intrusion prevention system
Personal experience
Bu Zheng has rich experience in information security enterprises.
In 2000, Lumeng Technology, founded by Bu Zheng, was one of the earliest enterprises engaged in network security in China.
He has been the director of threat research in McAfee, one of the three major security software companies in the United States for nearly ten years, led the team to conduct information security research around the world, and made many speeches at top international security conferences.
20 16 In August, at the China Internet Security Elite Summit of the 4th China Internet Security Conference (ISC20 16), Bu Zheng believed that cloud computing would set off a great innovation in the field of enterprise architecture.
2065438+In September 2006, Bu Zheng joined Didi Chuxing as the vice president of Didi Information Security, leading the information security team in an all-round way.
Bu Zheng and his team are advocates and pioneers of advanced threat protection combining virtual technology and threat intelligence technology. They have in-depth research in intrusion detection, malware, advanced threats and threat intelligence, and are widely praised.
Personal point of view
3C security architecture. The so-called 3C refers to cloud, object and environment:
Clouds are clouds. In other words, the terminal is not credible, the network equipment is not credible, and everything in others' hands is not credible. Your own logic and judgment should be in your own wisdom cloud.
Content is content. When designing a security product, we should try our best to let the security operation and maintenance department use it with the least cost and the most efficient use.
Context is context. The association between different protocols, different file formats and the context of the whole system and network level is a key point in the security system.
In the field of enterprise architecture, cloud computing will set off a huge innovation point.
Personal realization
Project completion
mcafeeintrushieldnetworkkintrusionprevention system
patented invention
System and method for fingerprint printing and correlation reproduction U.S. 9,106,680,
Issue date: 2065438+August 5 1 1.
Publish a work
Operation bus