Analysis of News relating to the Digital Money Ecosystem

You can see the latest news, recent news or all top news, going back in time.

Please share your valuable thoughts on the news with the community using the Comments box (register and log-in).

Analysis of News relating to the Digital Money Ecosystem

Korea raises concerns over China's cyber security measures in WTO meeting - The Korea Herald

13/11/2017 Link to source

Korea raises concerns over China's cyber security measures in WTO meeting South Korea has raised issues with China's strict cyber security regulations at a recent meeting of the World Trade Organization, citing concerns of potential trade secret infringement, a trade agency said Monday. The Korean Agency for Technology and ... and more »

Context

https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/icons/china.gifChina
The People's Republic of China (PRC), is a country in East Asia. It is the world's most populous country. Since the introduction of economic reforms in 1978, China has become the world's fastest-growing major economy.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/icons/korea.gifSouth Korea (Republic of Korea)
South Korea, also called the Republic of Korea is a sovereign state located in the southern part of the Korean Peninsula.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security
This category refers to technologies, processes and practices designed to protect systems, networks, computers, programs and data from attack, damage or unauthorized access.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Detect
This category refers to cyber security areas broadly corresponding to the Detect Function in the NIST Cybersecurity Framework.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Framework & Standards
This category refers to cyber security areas broadly corresponding to Framework & Standards.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Governance
This category refers to cyber security areas broadly corresponding to Governance.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Identify
This category refers to cyber security areas broadly corresponding to the Identify Function in the NIST Cybersecurity Framework.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Protect
This category refers to cyber security areas broadly corresponding to the Protect Function in the NIST Cybersecurity Framework.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Recover
This category refers to cyber security areas broadly corresponding to the Recover Function in the NIST Cybersecurity Framework.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Respond
This category refers to cyber security areas broadly corresponding to the Respond Function in the NIST Cybersecurity Framework.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Risk Assessment
This category refers to cyber security areas broadly corresponding to Risk Assessment.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Security Engineering
This category refers to cyber security areas broadly corresponding to Security Engineering.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Security Operation
This category refers to cyber security areas broadly corresponding to Security Operation.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Security information, event management (SIEM)
This category refers to cyber security areas broadly corresponding to Security information, event management (SIEM).
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/anon.pngCyber Security - Cyber Threat Intelligence (CTI)
This category refers to cyber security areas broadly corresponding to Threat Intelligence.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/framework/cot_vendor.pngDigital Technology
The Digital Technology domain has been described by Shift Thought™ as a way to understand the technologies that form the basis of the products and services within the Digital Money domain.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/icons/world.pngWorld
Worldwide the payments market remains fragmented with many different payment services and technologies, drivers, business models and value chains.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/stdefault.pngCyber Security
Cyber security relates to protection of systems, networks and data in cyberspace and in this topic we focus on connections with Digital Money, including e-commerce and e-security across mobile, web and other channels.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/stdefault.pngSecurity
This relates to the Security considerations for Digital Money
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/stdefault.pngTechnology
Technology has a key role to play in enabling innovations in digital money services.
https://shiftthought.s3.eu-west-2.amazonaws.com/spaces/digital-money/images/brochureicons/viewport_china_2015.pngDigital Money in China 2015
An immense change has taken place in mainland China over the last 5 years over which we have carried out in-depth studies of this market. This positioned China as the largest online retail market in the world, and a leader in the use of Digital Money.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.