Cyber Security in China

china-computer-hac_1963116b.jpg

China’s Internet and telecommunication giants are becoming more and more successful not only within China, but also outside the country. But how did they become that successful and why is the Chinese IT market increasingly challenging for western businesses?
In his latest China Monitor, Hauke Gierow (German Research Associate, MERICS) argues China is resolutely pushing /supporting the development of its own IT industry. But it is also isolating itself from international IT technology. By exercising control over major state-run businesses, the PRC is also maintaining its sovereign position in the IT sector.  
Furthermore, the Chinese government supports the international expansion and sales endeavors of Chinese IT companies, the so-called ‘national champions’. With their products, they are stepping up competition with Western companies in developing and emerging countries, while on the other side, companies like Huawei or Lenovo are also frequently alleged to open back doors for Chinese spying in the West.
According to Gierows findings, isolationism and protectionism within China lead to another problem for Chinese IT companies: the obligation to censor the Internet. Not only does censorship affect freedom of speech, but it also impacts the entire economy. 86% of European Companies now regard Internet censorship as a major obstacle to doing business in China, a survey quoted in the report finds.
In terms of foreign companies, censorship, cyber attacks, and protectionism in China do not only hurt their businesses but have also become a key location factor for foreign companies. They must comply with ever more stringent regulations in the IT sector, impeding their ability to protect business secrets and hindering international co-operation.
Hauke Gierow concludes that, instead of insistently calling for fundamental changes in Chinese internet policy, the Federal Government of Germany should negotiate specific improvements for German businesses, for example in terms of market access or protection of intellectual property rights. 
Merics: http://bit.ly/1HZbKJL

« United Airlines Bans Researcher After 'joke tweet'
IBM Watson is 'Moonshot' in Healthcare »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

European Defence Agency (EDA)

European Defence Agency (EDA)

EDAs mission is to improve European defence capabilities. Programme areas include Cyber Defence.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

MonsterCloud

MonsterCloud

MonsterCloud is a leader in managed cyber security services. Our cyber security team constantly monitors and protects businesses from cyber threats.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

Tech Seven Partners

Tech Seven Partners

At TechSeven Partners, we provide a full suite of cyber security solutions for your business including network monitoring, onsite and cloud backup solutions, HIPAA or PCI compliance.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

Otto

Otto

Stop Client-Side Attacks. Plug otto into your application security suite and protect your supply chain.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.

Cyber Nations

Cyber Nations

Cyber Nations is a global program designed to engage 100,000 African, Caribbean and Canadian learners to be trained in cybersecurity with a path to employment.