CEO Blog

A virtual club to communicate with peers and users in the cryptographic industry
Meet friends on blog, it is my mission to popularize cryptographic knowledge, cryptographic application and zero trust ideas.

  • Recommended
  • 零信任
  • 零信浏览器
  • 网站安全
  • 身份可信
  • 定制中级根
  • 其它
  • The third of three steps of zero trust security for websites: trusted identity validation

    The third of three steps of zero trust security for websites: trusted identity validation

    Zero trust is a security principle, it is also very suitable for website security. All browsers display HTTP websites as "Not secure," which is zero trust to websites that don't have a validated trusted identity. ZoTrus Website Security Cloud Service realizes HTTPS encryption, cloud WAF protection and trusted identity validation with one click, efficiently and quickly protects website security, and perfectly realizes the three steps of zero trust security for websites.

    June 24, 2022Read more
    The second of three steps of zero trust security for websites: cloud WAF protection

    The second of three steps of zero trust security for websites: cloud WAF protection

    Zero trust is a security principle, it is also very suitable for website security. Never trust every web connection, always verify, allow normal connections, and block malicious connections. ZoTrus Website Security Cloud Service is a one-click realization of cloud WAF protection, efficient and fast protection of website security, and the perfect realization of the second of three steps of zero trust security for websites.

    June 22, 2022Read more
    The first of three steps of zero trust security for websites: HTTPS encryption

    The first of three steps of zero trust security for websites: HTTPS encryption

    Zero trust is a security principle, it is also very suitable for website security. HTTPS encryption is zero trust to HTTP cleartext transmission. ZoTrus Website Security Cloud Service is a one-click implementation of HTTPS encryption, efficient and fast protection of website security, and the perfect realization of the first of three steps of zero trust security for websites.

    June 20, 2022Read more
    Popularize the application of SM2 SSL certificate, starting from popularizing the use of SM2 browser

    Popularize the application of SM2 SSL certificate, starting from popularizing the use of SM2 browser

    To popularize the application of the SM2 SSL certificate, we must first have a browser that supports the SM2 algorithm and popularize the use of SM2 browser. Browsers (including mobile Apps), SSL certificates and web servers all support the SM2 algorithm to setup a SM2 certificate application ecosystem.

    June 17, 2022Read more
    IE, Bye Bye! Green address bar, No Bye Bye!

    IE, Bye Bye! Green address bar, No Bye Bye!

    On June 15th, IE browser, which has served users for 27 years, officially said goodbye to global Internet users. The author will not complain about many things about IE browser. Let’s write something about miss IE browser.

    June 16, 2022Read more
    Edge cloud WAF has more technical advantages than central cloud WAF

    Edge cloud WAF has more technical advantages than central cloud WAF

    Website security requires https encryption and cloud WAF protection, but in order to improve user experience, CDN plus edge WAF protection is most needed. The rapid product iteration of ZoTrus Website Security Cloud Service only provides the most needed and best website security cloud service.

    June 15, 2022Read more
    Website security cloud service will surely become the standard for all websites

    Website security cloud service will surely become the standard for all websites

    Website Security Cloud Service, a website security solution that designed for the cloud era, a cloud service that leads website security into the 2.0 era, will surely become the standard for all websites. This article explains this prediction in detail.

    June 13, 2022Read more
    Website identity is displayed as green address bar, greatly welcomed worldwide

    Website identity is displayed as green address bar, greatly welcomed worldwide

    By analyzing the access statistics of the ZT Browser website, the users of ZT Browser have covered 33 countries and regions around the world within 10 days of its release. Why is it so popular? This article is interpreted based on the content of the presentation originally planned to speak at the CA/Browser Forum.

    June 10, 2022Read more
    Re-understanding SSL certificate

    Re-understanding SSL certificate

    The DV SSL certificate, which only validates the domain name control, has accounted for 83.43% of the SSL certificate. The SSL certificate has been out of shape and turned into an encryption tool, and the original intention of proving the identity of the website has been lost. What to do? Does the trusted identity of a website no longer matter?

    June 06, 2022Read more
    SME websites are most vulnerable to cyber attacks

    SME websites are most vulnerable to cyber attacks

    Due to the inability of small and medium-sized enterprises to invest heavily in network security, their websites have become the hardest hit areas for network attacks. Not only that, but compliance with the Cybersecurity Law is also a hard requirement for an enterprise. What should we do? This article has solutions to share.

    June 06, 2022Read more
    Magical CNAME

    Magical CNAME

    Some readers are familiar with CNAME domain name resolution. This article talks about how to use CNAME resolution to realize automatic https encryption and cloud WAF protection with one click, which really makes website security no longer a thing!

    June 06, 2022Read more
    Digital Transformation, Cryptography, Zero Trust

    Digital Transformation, Cryptography, Zero Trust

    Digital transformation is a must, but digital transformation without security is the root cause of disasters. What technologies should be used to ensure the success and sustainable and healthy development of digital transformation? This article has wonderful views and solutions, which should not be missed!

    June 01, 2022Read more
    Richard_wang

    Dear Readers,

    Since the subtitle of the CEO blog is “Meet friends on blog”, as a scientific and technological worker rather than a literato, please do not care whether the grammar of the blog post is correct, but whether the article can help you understand PKI technology, cryptographic and zero trust. I have 30 years of experience in the IT industry, including CA, cryptography, software development, Internet, Internet security etc. Over the years, I have participated in many important domestic and international academic conferences, to understand the differences between Chinese and Western cultures and the latest technological frontiers. And has published many academic articles in newspapers and periodicals. In company operation, the two companies I founded have been acquired by a public listed Internet security company, and one of them is a CA that had won the sixth place in the world in the SSL certificate market and the first in the Chinese market.

    I firmly believe that my article will bring value to readers both academically and company operation. thanks.

    Welcome to follow the official WeChat of ZoTrus: zotrus, which will push each new blog in real time, so that you will not miss every wonderful blog post.


    Dec. 20, 2021, in Shenzhen, China