On Tuesday, a senior-level Chinese official acknowledged that the country uses a technologically sophisticated firewall to block “harmful information” from being distributed over the Internet, but defended the measure, saying it’s not much different than the controls used in Europe and the United States, the International Herald Tribune reports.Liu Zhengrong, supervisor of Internet affairs for the information office of the Chinese State Council, noted repeatedly that Chinese efforts to control the Web were overblown in recent media coverage. He said that many of the laws governing Chinese Internet users were modeled after American and European regulations, the International Herald Tribune reports.“If you study the main international practices in this regard you will find that China is basically in compliance with the international norm,” Liu said in a briefing. “The main purposes and methods of implementing our laws are basically the same.”Liu named pornography as a main cause of Chinese censorship, and noted that its concerns about this type of material are very different than in other developed countries, the International Herald Tribune reports. China has come under fire in recent weeks for its efforts to censor content on Microsoft’s MSN Spaces site, and Google’s Chinese language search site, Google.cn. For more on the subject, read CSO sister publication, CIO’s Microsoft Shuts Down Chinese Blogger, Google Will Censor Chinese Web Searches, U.S. Lawmaker Battles Chinese Internet Censorship and Firms Ask Gov’t to Stand Against Censorship.On a separate note, are you a Harrison Ford fan? Have you seen his new flick, ’Firewall?’ Check out what a handful of security chiefs had to say about the movie at Security Mavens’ Reviews of the Movie ’Firewall’. Don’t forget to keep checking in at our CSO Security Feed page for updated news coverage. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe