Feeds

Huawei US bags defence biz strategist as new CSO

Donald Purdy takes on tough role

Mobile application security vulnerability report

Huawei has appointed a former strategist for a US defence contractor as its new chief security officer, in what could be seen as an attempt to allay Congress concerns that the firm poses a national security risk.

Donald Purdy, who held the role of chief cyber security strategist at CSC, started his job as the new CSO on Tuesday, according to the Washington Post.

A Huawei spokeswoman would only confirm to The Reg that an appointment had been made but had no further info at the time of writing.

According to his biog, Purdy has a long and distinguished career in the security space and particularly at the heart of government in the US.

He was a member of the White House team which drafted the National Strategy to Secure Cyberspace in 2003 and worked at the Department of Homeland Security for over three years, including the last two as head of the US CERT and National Cyber Security Division, both of which he helped set up.

This is not the first time the Chinese telecoms kit maker has sought to gain an advantage by hiring a well-known public sector figure to its cyber security team.

In 2011 it announced former UK government CIO John Suffolk was joining as global head of cyber security after gaining clearance from prime minister David Cameron.

New Huawei USA CSO Purdy will certainly have his work cut out.

The firm’s ties with the Chinese government are currently being investigated by a US House of Representatives Intelligence Committee and it’s unlikely to be granted further access to the lucrative US telecoms infrastructure market until these national security concerns are allayed.

Such concerns, which the firm furiously denies, have already forced it to drop a proposed $2m (£3.1m) acquisition of server firm 3Leaf Systems and managed to scupper a deal for network firm 3Com.

It also doesn’t help matters much when government-backed reports such as the one from contractor Northrop Grumman in March claim that the firm has close collaborative ties with the People’s Liberation Army (PLA).

Huawei has spent many years and PR dollars trying to distance itself from such associations, which stem from the fact that founder Ren Zhengfei used to serve in the PLA before setting up his company. ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.