New vulnerability attack and defense research, study some new security vulnerabilities, such as the recent vulnerability research of struts2, domain name hackers and so on. , and formulate corresponding protection scheme.
Open source/third-party component vulnerability tracking, tracking the third-party and open source components used by the company, and fixing vulnerabilities as soon as possible; It is not enough to promote the implementation of safety products only through technology. Sometimes, technology needs to be transformed into safety products to reduce people's workload.