Access your Pro+ Content below.
The China Syndrome: Security factors to consider before buying Chinese IT
Chinese IT equipment is often cost-effective, but the U.S. government believes Chinese vendors are a threat to American interests. This month, Information Security Magazine examines the Huawei security risks and offers points to consider before purchasing hardware from China. Elsewhere in this issue, we reveal the results of our 2013 Security Priority Survey. Over 1,800 security pros participated and the results show that mobile security dominates the worry list. We’re also looking at balancing BYOD risks and rewards where Infosec pros share their strategies for employee-owned mobile device security.
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Cover story: The U.S. government says Chinese IT giants Huawei and ZTE pose too much risk. But do they? Joel Snyder offers his take.
2013 IT security trends reveal mobile device security tops the list of priorities for security pros this year.
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies.
News in this issue
Going on the offense doesn’t mean actively targeting cybercriminals, experts say. Deceptive tactics, phony documents can help trip up attackers.
Columns in this issue
Information Security Magazine reveals the results of its 2013 Security Priority Survey and examines the security risks associated with purchasing IT hardware from China. Elsewhere in the issue, infosec pros share their strategies for BYOD security.
University information assurance programs are varied, but they are beginning to provide technology disciplines a level of security knowledge.
No ultimate test can give third-party software a clean bill of health, but careful assessment can help organizations gain more control over vendors.