Tech UPTechnologyHuawei seeks to regain trust by strengthening its privacy...

Huawei seeks to regain trust by strengthening its privacy infrastructure

During the presentation to Latin American media of its new Global Center for Cybersecurity Transparency and Privacy Protection, located in China, Huawei Technologies executives emphasized the need to work with other industry players to regain trust in their products.

But it is not about the consumer electronics group -which has been dealing with the decrease in its market share of smartphones in various regions of the planet for more than a year- but the one in charge of creating network and infrastructure products, to which of governments have made it difficult to participate, for example, in the deployment of 5G networks, the same in America as in Europe.

That is why Karl Song, the VP of corporate communication at Huawei Technologies, insisted that they work closely with their clients, but also with the rest of the companies that participate in the implementation chain. Huawei Technologies is a technology provider that takes care of the design of its products, but other companies are also involved in the integration and maintenance process.

Given the importance of computer security, Huawei invests a good part of its Research and Development budget in creating secure models, based on standards that reduce the risks of cyberattacks and thus build trust.

This new Global Center for Cybersecurity, Transparency and Privacy is located in Dongguan province, China, being the largest of its seven locations, and is one of the two that it serves globally.

Huawei Technologies has been developing a cybersecurity strategy for 10 years and currently invests 1,000 million dollars in this area, working together with telecommunications companies that offer OTT (Over The Top) services. Their security basis is the European GDPR law, at a global level, but they also adapt specifically to local laws when necessary.

With the opening of their new campus in Dongguan they also set a precedent by making the documentation they use as the basis for planning their security strategy, “Huawei Product Security Fundamentals”, available to the public for the first time in the interest of winning. industry confidence.

Additionally, they work with independent entities that verify their security processes, and have amassed more than 200 verifications by 30 of those entities. Their motto in this regard is: ‘many eyes and many hands’, to ensure a transparent process, which is why they have also made a system available to the world through which to receive reports of vulnerabilities that are discovered in their products. Because the life cycle of telecommunications products is long, the company needs to maintain their security, through updates via software.

They insist that by working on four levels of security, which starts with devices and includes networks and data, at the application layer they share responsibility with OTT service providers and it is an issue that needs review. But Huawei is doing its best to be transparent and gain trust.

Cybersecurity specialists: what do they do and how much do they earn?

A document reviewed by Expansion of Guacamaya Leaks revealed that cyber attacks cost 538 million pesos and only 105 million are stopped. Hence the need for these specialists.

Espionage? To go to Qatar 2022 you must install these two apps

Ehteraz and Hayya are the apps that every tourist should have on their smartphone, but they are already worrying security experts

Identity fraud: 6 tips that Mexicans should follow so they don't get robbed when...

Not providing the INE credential, even when you visit a museum, and never losing sight of your cards when paying for your products or services can prevent you from having bad times.

Mexican government prepares Federal Cybersecurity Law against hacks to state companies and secretariats

Pemex, the National Lottery, Bancomext and the CFE are some of the state companies that have been hacked since 2019. Recently, the Ministry of National Defense was also hacked.

Do you know them? These are the six most famous hacker groups in recent...

A hacker is not the same as a hacktivist than a cybercriminal. We explain the differences and tell you what the six most emblematic groups of cybercriminals and hacktivists of the last decade have been.

More