China Wants FBI’s Help With Internet Security

China wants to have deeper Internet security, anti-terrorism and corruption cooperation with the United States, Chinese security officials told the visiting director of the FBI, state news agency Xinhua says.

Meeting in Beijing, Public Security Minister Guo Shengkun, told James B. Comey that China was willing to enhance strategic mutual trust and the respect of each others core interests, Xinhua said.

The two countries should "deepen law enforcement and security cooperation in the fields of Internet security and counter-terrorism", the report paraphrased Guo as saying.

Comey said the Federal Bureau of Investigation was willing to push forward pragmatic cooperation, Xinhua said. The report did not elaborate.

Hacking has been a sore spot in US-China relations. In September, President Barack Obama said he and Chinese President Xi Jinping had agreed that neither government would knowingly support cyber theft of corporate secrets to support domestic businesses.

China has also been seeking more counter-terrorism cooperation with Western countries, which the West has generally been unwilling to give, fearful of complicity in possible human rights abuses in China.

China has blamed Islamist militants for violence in its far western region of Xinjiang, where hundreds have been killed in the last few years. Rights groups and exiles say the problem stems more from anger at Chinese controls on the religion and culture of the Muslim Uighur people who call Xinjiang home, rather than from any cohesive militant group. China strongly denies any rights abuses in Xinjiang or elsewhere.

In a separate report recently, Xinhua cited domestic security chief Meng Jianzhu as telling Comey that China also wants more cooperation on recovering corrupt officials who have fled overseas, and their assets. The report also did not elaborate.

Last year, China pursued and brought home more than 600 suspected corrupt officials in a strategy dubbed "Operation Fox Hunt", as it widens a crackdown on deep-rooted graft launched by President Xi Jinping upon becoming Communist Party chief in late 2012.

Reuters: http://reut.rs/21xhssv

« U-Upload : Knowledge Straight To Your Brain
Is Apple Right To Resist The FBI? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

CloudPassage

CloudPassage

CloudPassage, a cloud security and compliance pioneer, safeguards cloud infrastructure for the world’s best-recognized brands.

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

Inseego

Inseego

Inseego provides Enterprise SaaS solutions and IoT & Mobile solutions, which together form the backbone of intelligent, reliable and secure IoT services with deep business intelligence.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

Melius Cyber Security

Melius Cyber Security

Melius Cyber Security has developed a world-leading SaaS platform, Cyber Safe Plus, built around continuous assessment and improvement through vulnerability scanning and penetration testing

Glocomp Systems

Glocomp Systems

Glocomp Systems is one of Malaysia’s premier ICT infrastructure distributor offering a comprehensive portfolio of solutions including cybersecurity and privacy.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Vali Cyber

Vali Cyber

Vali Cyber was founded in 2020 with the mission of addressing the specific cybersecurity needs of Linux.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.