Search: Cybersecurity (109 materials)

 

Time to Create a Single Negotiating Cyber Forum under the UN General Assembly First Committee

... proposals and comments made during the plenary sessions and those on various draft reports at the stage of negotiations are accessible on the official UN ODA website. Besides, in cooperation with the OAS, UN ODA and Kenya, ICT4Peace organized a series of cybersecurity policy and diplomacy training workshops for Latin American and African diplomats. On Friday, March 12, 2021, after one and half years of proceedings, the UN Open Ended Working Group (OEWG) on Information and Telecommunications (ICT) in the ...

02.04.2021

Broad Cyber-Consensus

... levels who would then be included into a kind of international directory. A group of over 40 countries led by France and Egypt managed to get an initiative of their own— proposed back in the fall of 2020 and urging to introduce a permanent forum on cybersecurity to replace the OEWG and GGE—included in the recommendations. The initiative, dubbed as the Programme of Action for Advancing Responsible State Behaviour in Cyberspace, appears in one of the paragraphs in the OEWG report, which lends weight ...

30.03.2021

On the Authority of American’s DNI: Are China’s Cyber Espionage and Wolf-Warrior Diplomacy Worrisome for BND and BFV?

I have been living for quite some time in Germany, and as national security and counter terrorism Analyst, I have observed the socio-economic, political and security developments in the country. In order to get an exact posture of the Germany foreign policy objectives, I joined a couple of leading political parties and even endeavored to get along with German intelligence networks thru different channels to obtain a greater picture of foreign policy objectives and forward strategy vis a-vis China...

30.12.2020

Cybersecurity & Digital Transformation

Cybersecurity is one of the most important subject in the Fourth Industrial Revolution period during recent pandemic World recognised the importance of Digital Transformation (DT). DT brings new cyber risks that could impact the initiative of also smart ...

12.12.2020

Russian Cyber Sovereignty: One Step Ahead

... disinformation material and malware. Foreign actors can also steal valuable and protected information. Needless to mention that all of the mentioned types of information can be manipulated and adapted as needed for cyber operations. Pavel Karasev: Cybersecurity and NATO’s Nuclear Capability The final layer consists of the users who shape the cyberspace experience and its nature by communicating with each other, creating and spreading content. The main vulnerability of the users are other manipulative ...

08.09.2020

Cybersecurity and NATO’s Nuclear Capability

... dependence between NATO’s command, control and communication systems (NC3) for its conventional and nuclear capabilities, and the legal consequences of an attack on dual-purpose command and control systems. The crucial issue under consideration is the cybersecurity of command, control, and communication systems of NATO’s nuclear capabilities: more than half of the report’s substantive part focuses on this. In addition to the prominent place and much attention given to this issue, its importance ...

28.08.2020

The U.S. on the Way to Strategic Invulnerability

Washington Hopes to Ensure its Global Military Dominance and National Security Against Virtually All Threats For Russia, the military developments and strategies of the United States recreate those challenges and threats that the USSR associated with President Ronald Reagan’s Strategic Defense Initiative (SDI). Adopted in 1984, the SDI programme involved deploying several echelons of space strike weapons that would intercept and destroy ballistic missiles and their re-entry vehicles in all flight...

10.07.2020

Shrinking Cyber-Universe

... for Defence Studies and Analyses, 2019). In their work, the authors examine the general concept of cyberspace, while extrapolating it to India's cyberspace dimension. Cherian Samuel and Munich Charma: India's strategic options in a changing cyberspace Cybersecurity problems are tightly included in the new agenda of international relations, which stresses the importance of their comprehensive study, now more relevant than ever. The work raises several issues that appear to be important for a modern ...

16.06.2020

Business and the State: Together into the Brave “Cyber World”?

... easier to do business. Third, if single standards and rules are developed, those companies that fail to comply may be held accountable. This is an excellent way to consolidate one’s market standing and undermine competitors. Steve Crown: Microsoft Cybersecurity Initiatives Finally, by calling for government regulations, companies will be able not merely to join the process of drafting rules that suit them, but to take the lead in this, especially since they have the groundwork already laid out....

18.05.2020

Global Tech Companies Counter Online Terrorist Content

Governments demand that global internet platforms step up the fight against extremist and terrorist content One of the most recent trends to appear in internet governance is the tightening of control over online content. And it was China and Russia that set the wheels for this in motion. The trend has extended across the globe – just look at the impressive list of states that supported the Christchurch Call to Action to eradicate terrorist and violent extremist online content. France, the United...

02.04.2020
 

Poll conducted

  1. In your opinion, what are the US long-term goals for Russia?
    U.S. wants to establish partnership relations with Russia on condition that it meets the U.S. requirements  
     33 (31%)
    U.S. wants to deter Russia’s military and political activity  
     30 (28%)
    U.S. wants to dissolve Russia  
     24 (22%)
    U.S. wants to establish alliance relations with Russia under the US conditions to rival China  
     21 (19%)
 
For business
For researchers
For students