The British business magazine The Economist brings a new perspective to the hitherto little differentiated debate on the cyber security risk Huawei: the handling of risks, a central category of risk management. The West fears that Huawei’s equipment could have back doors and that these security holes would allow the Chinese to carry out cyber… Continue reading Huawei debate: Risks can be managed
The Chinese State will in future pursue cybercrime and theft of trade secrets via the Internet in cooperation with other countries. To this end, the Ministry of Public Security launched an operation called Cloud Sword in July 2019, which focuses on international cooperation in the fight against transnational cybercrime. The new programme is showing first… Continue reading Operation Cloud Sword: China Fights Cybercrime
In the fight against counterfeiting and piracy on the Internet, brand owners must try to identify and eliminate counterfeit manufacturers in the real economy. Those who find illegal sales in Internet marketplaces and online shops with the help of crawling software and only have them deleted manually or automatically cure the symptom. The deleted offers… Continue reading Deception Package Crawling Services
China has released its new Artificial Intelligence Development Plan. It focuses on strategic objectives and the development of new artificial intelligence by 2030, and also includes protective measures, a detailed timetable and a three-step roadmap. By 2020, the national applications of artificial intelligence are to be synchronized with the global development of this technology. Particular… Continue reading Artificial Intelligence: China Pushes Forward
On 26 October, the National People’s Congress of the People’s Republic of China passed the new Chinese Encryption Act (密码法), which will come into force on 1 January 2020. It can be seen as a further addition to the cyber security regime that China has been developing for years and which has gained momentum with… Continue reading Access still allowed – The new Chinese Encryption Law
A clear result of the IP Crime Conference in Cape Town: According to prosecuting authorities, brand and product piracy is becoming increasingly digital and transnational. Counterfeiters today are technologically highly advanced and have a global reach – their products are produced in the country A, transported via the country B and sold in the country… Continue reading IP Crime Conference in Cape Town: Can the Public Sector Keep Up?
The value of machines is increasingly shifting from the actual machine to the embedded systems and thus above all to the embedded software. This means that in addition to protecting the machine with traditional IP, i.e. patents, utility models and designs, the software should also be protected as good as possible. So how can embedded… Continue reading Protection of Embedded Software in China