China tightens grip over the Internet

 

?m=02&d=20150416&t=2&i=1040822494&w=644&fh=&fw=&ll=&pl=&r=LYNXMPEB3F06I

U.S. Commerce Secretary Penny Pritzker makes a speech at Microsoft China Center in Beijing 

A full text of China’s new Internet law has yet to be released, but it calls for better cybersecurity, according to a report from China's state-controlled Xinhua News Agency. The country's key information systems and data will also be made "secure and controllable" under the law.

Previous drafts of the legislation don't state in detail what that control might mean. US trade groups have expressed ongoing concern that China's security policies are going too far, and could push foreign businesses out of the country.
Earlier this year, China's anti-terror legislation drew complaints because it could require US tech companies to hand over encryption keys to the country's government. President Obama even weighed in and asked China to change the legislation.

In recent years, however, China has made cybersecurity a priority, following leaks from security contractor Edward Snowden that claim the US had been secretly spying on Chinese companies. The Chinese government has even said it would block IT products from being sold in the country, if they failed an upcoming "vetting system."

The policy changes in China probably won't bode well for US tech companies, especially for those that supply IT products to the government or state-owned companies, according to analysts. Already, China heavily censors its Internet and blocks many U.S. sites, including Facebook, Twitter and Google. China, however, has said its new security laws are following what other Western countries have done to improve their cybersecurity.
"China has always maintained open policies to the rest of the world," said Zheng Shuna, a government official during a press conference. "We welcome all foreign enterprises in China to abide by the laws, and offer legitimate services."
Computerworld: http://http://bit.ly/1HHGr6o

 

« Keep Calm and Spy On: Why the OPM Hack Won’t Bring Down US Intelligence
The Changing Face of Cyber Risk for Law Firms »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Norwegian Business & Industry Security Council (NSR)

Norwegian Business & Industry Security Council (NSR)

NSR is a member organization serving the Norwegian business sector in an advisory capacity on matters relating to crime and security including cyber.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Seltek Technology Solutions

Seltek Technology Solutions

Seltek provides Digital Forensics, eDiscovery, Cybersecurity Assessments and IT Support services.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

Eperi

Eperi

Eperi is a leading provider of Cloud Data Protection (CDP) solutions with 15 years of experience in data encryption for databases, (SaaS) applications and files.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

Business Hive Vilnius (BHV)

Business Hive Vilnius (BHV)

BHV is one of the oldest startup incubator and technology hubs in the Baltics, primarily focused on hardware, security, blockchain, AI, fintech and enterprise software.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

Vantea SMART

Vantea SMART

Vantea SMART have decades of experience in cybersecurity resulting in an approach of proactive prevention - Security by Design and by Default.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

Sekur Private Data

Sekur Private Data

Sekur Private Data Ltd. is a Cybersecurity and Internet privacy provider of Swiss hosted solutions for secure communications and secure data management.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.