... easier to do business.
Third, if single standards and rules are developed, those companies that fail to comply may be held accountable. This is an excellent way to consolidate one’s market standing and undermine competitors.
Steve Crown:
Microsoft Cybersecurity Initiatives
Finally, by calling for government regulations, companies will be able not merely to join the process of drafting rules that suit them, but to take the lead in this, especially since they have the groundwork already laid out....
Governments demand that global internet platforms step up the fight against extremist and terrorist content
One of the most recent trends to appear in internet governance is the tightening of control over online content. And it was China and Russia that set the wheels for this in motion. The trend has extended across the globe – just look at the impressive list of states that supported the
Christchurch Call to Action
to eradicate terrorist and violent extremist online content. France, the United...
... partly in Taiwan, where the government has for two decades now been successfully using a system of mass surveillance of the everyday life of its citizens – a system that has received the approval of the people. This
system
is part of Singapore’s cybersecurity strategy and allows the physical condition of large masses of people to be monitored, thereby preventing diseases from spreading and escalating into epidemics. This, combined with their ability to enforce extremely strict quarantine measures ...
What we need is not strategies against cyber coercion, which RAND experts call for, but international frameworks for precluding cyberspace conflicts.
What is cyber coercion and how have states used cyber operations to coerce others? These are the questions addressed in the RAND think tank's recent
report
"
Fighting Shadows in the Dark. Understanding and Countering Coercion in Cyberspace
". The authors discuss cyber operations conducted by four states — Russia, China, Iran and North Korea...
The possibility that decisions about the use of nuclear weapons will be influenced by information and communication technologies (ICTs) is the most serious threat that exists today.
Strategic stability is once again becoming a primary concern in international relations. The topic has received a great deal of attention of late, mainly because of the steady erosion of the reduction and limitation regime: the United States has now withdrawn from both the Anti-Ballistic Missile Treaty (ABM Treaty)...
Interview with Steve Crown, Vice President and Deputy General Counsel at Microsoft
Today cybersecurity is a major concern for both governments and technology companies and spans domestic and international engagement. Microsoft has been vocal on the challenges in this space and has put forward several proposals. These include the Digital Geneva ...
Can you see confidentiality? No? It is actually out there. But it is vague
We all know, or suspect, that confidentiality is important: no one wants their personal, sensitive information to become public. However, at what point does data confidentiality cease to be our own personal business and become a matter of international security, a focus of national or international agendas?
Pavel Sharikov
Protecting Sensitive Data: The Experience of Russia and the US
There is currently no common notion...
... while Sub-Paragraph 1.7 notes that “States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 of 23 December 2003 on the creation of a global culture of cybersecurity.” The majority of states concur with these statements, although the problem is implementing this mutual consent and translating it into practical action.
... and a high level of oversight, thus making it possible to achieve outstanding successes with minimal expenses (India’s space program is a prime example), areas believed to be of secondary importance are plagued by chronic problems.
Until recently, cybersecurity was not one of the Indian government’s top priorities, and consequently, the relevant departments in state agencies were, as a rule, staffed residually. Since work in this area was not considered important or prestigious, employees working ...
At the strategic level, war will mostly be waged in cyberspace. Tactically, we will witness the widespread use of autonomous weapons systems
This study presents the results of an analysis of future warfare. As the paper states, cyber warfare will be waged at a strategic level. The operative level will be characterized by the use of long-range precision weapons against economic infrastructure. The tactical level will be characterized by the massive use of autonomous ground-based, air and sea weapons...