China to block IT products that don't pass cybersecurity vetting
Tensions are rising between China and the U.S. over cyber security issues
IDG News Service - China is threatening to block companies from selling IT products in the nation if they fail to pass a new "cybersecurity vetting system" meant to weed out secret spying and surveillance activities.
Major IT products and services that relate to national security or public interests will be vetted under the new system, China's state-controlled Xinhua News Agency announced on Thursday.
The regulations come from China's State Internet Information Office and are meant to safeguard the country, according to the Xinhua report. But they also come amid rising tensions with the U.S. on security issues that could potentially disrupt relations between the two nations.
Earlier this week, the U.S. took unprecedented action and indicted five Chinese military officers for allegedly hacking into several U.S. companies. Lasting from 2006 to this year, the alleged cyberattacks stole trade secrets that were then supplied to rival Chinese companies.
Analysts believe the U.S. indictment will put a spotlight back on China's corporate espionage activities. But so far, the accusations have been met with a harsh response from Chinese officials, who deny that the nation has ever engaged in state-sponsored hacking.
The Chinese government is demanding the U.S. withdraw the indictment. In addition, officials have been portraying the U.S. as a hypocrite that engages in its own cyber-espionage activities. They point to recent leaks from former National Security Agency contractor Edward Snowden, which claim that the U.S. has been spying on Chinese schools and companies.
On Thursday, China's State information Office also cited the Snowden leaks as a reminder of why cybersecurity is needed, according to the Xinhua report. It went on to state that China's government departments, companies, universities and telecommunication firms have all been victims of wiretapping and intrusion.
Specific details were not given on how the vetting system will work. But it has the potential to limit business for U.S. tech firms, including Microsoft, IBM and Cisco, none of which immediately responded to a request for comment.
The U.S. has already taken similar action against Chinese telecommunication equipment suppliers Huawei and ZTE. In 2012, a U.S. congressional committee concluded that both companies were a security threat due to their alleged ties with the Chinese government. The committee advised that U.S. companies buy their networking gear elsewhere.
China's new vetting system could have the same affect, and push more of the nation's state-owned companies toward domestic IT suppliers, according to analysts. It could also result in stricter government standards on cybersecurity that all Chinese industries will have to comply with.
The new regulations will benefit local companies like Huawei and Lenovo while foreign tech firms will face more barriers in China, said Charlie Dai, an analyst with Forrester Research. To stay relevant, foreign tech companies will have to form stronger ties with the Chinese government and domestic firms. But for the good of both nations, the U.S. government should try to ease the current tensions, he added.
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- PCI 3.0 Compliance In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint devices.
- Mitigating Security Risks at the Networks Edge This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
- 5 Strategies for Modern Data Protection Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!