More: cybersecurity

BRICS Agenda for Digital Sovereignty

Authors: Alexander Ignatov and Elena Zinovieva* With Russia chairing BRICS this year, there is added urgency to the relevant avenues of international cooperation in ICT...

Widening Disparities and Growing Threats Cloud Global Cybersecurity Outlook for 2024

A new World Economic Forum report released today provides a snapshot of the multifaceted challenges facing the global cybersecurity landscape. While increased geopolitical tensions...

Three Effective Ways to Protect Your Business from Cyber Attacks

In this technology-driven world, our personal and professional lives are being made easier every day. While everyone is grateful for the advent of technology,...

Managing Cybersecurity Risks Related to AI in Developing Countries: Strategies and Solutions – Part II

In the first part of this article, I discussed the various challenges faced by developing countries in managing cybersecurity risks associated with AI. Now,...

Managing Cybersecurity Risks Related to AI in Developing Countries: Challenges and Strategies Part I

In today's digital era, artificial intelligence (AI) has become a crucial component across various sectors, particularly in developing countries that face unique cybersecurity challenges...

Delivering Safe Cyber Environment Through Indonesia National Cyber Risk Management Approach

Indonesia has started their strategic initiatives by discussing the Draft Bill of Cyber Security Act. However, the government and the parliament have yet to...

Domain Typosquatting: Online trademark protection in the name of typing errors

A current report recently published an alarming number: In 2018, users "accidentally" visited CM websites such as itunes.cm or espn.cm and thus came across...

The Growing Threat of Cyber Attacks on Physical Security Systems

As systems connect online, they become hackable, meaning cyber attacks now threaten businesses, governments, and people, even on a physical level. In this blog post,...

Chinese proposals for Metaverse show that we are negotiating for “Cyberterritory”

The latest proposals aimed at regulating the Metaverse, put forward by China Mobile, on July 5 in the International Telecommunications Union’s (ITU) metaverse focus group meeting...

Mounting Cyber Espionage and Hacking Threat from China

Earlier this month a ransomware attack on America’s Prospect Medical Holdings, which operates dozens of hospitals and hundreds of clinics and outpatient centres across...

Latest

Time to Rein in Unaccountable AI Platforms: A Call for Civil Society Involvement and Responsible Development

Addressing the lack of accountability among digital platforms is...

Russia and the G5 Sahel Group’s Indivisible Security Relationship

In practical terms, the indisputable geopolitical changes and the...

Anchoring Stability in the HoA: The Transformative Impact of Somalia-Turkey Maritime Security Pact

The ratification of the Maritime Security and Economic Development...

Lithuania has “addicted” to military purchases from the U.S.

Lithuania is actively strengthening its Armed Forces and purchasing...

Subscribe

spot_imgspot_img