One could say that the wish list for cyber-peace was already written in 2015, when states agreed on some rules of behaviour in cyberspace - including that existing international law applies to it. Are we good to go? Not so fast. The devil is in the d...
 4 Dec 2019

Blog post
In December of last year, New York City was the place for diplomats to write a long list of New Year cyber-wishes, which came in the form of resolutions that established the first UN Open-Ended Working Group on Developments in the Field of ICTs in th...
 4 Dec 2019

Blog post
Dr Marcel Dickow, PhD, is Head of the International Security division at the German Institute for International and Security Affairs (SWP) and Coordinator of the International Panel on the Regulation of Autonomous Weapons (iPRAW). He is a physicist b...

People
The Geneva Internet Platform (GIP) organised a webinar entitled ‘What is responsible behaviour in cyberspace?’ within the framework of the Geneva Dialogue on Responsible Behaviour in Cyberspace. The webinar explored how responsible behaviour in cyber...
 30 Oct 2018

Blog post
An interactive online capacity development programme Internet governance (IG) has become one of the most important policy areas of our time. Topics like privacy protection, human rights online, and cybersecurity are increasingly in the focus of gl...

Course

Description:

The comic brings a worrying, yet realistic and educative story that follows a life of a cyber vulnerability, from its inception to its deployment for an actual cyberattack.

Source: 
Cybersecurity
 Vladimir Radunovic, Vladimir Veljasevic , 2018
 

Resource text:

Printer Friendly and PDF
In 2016, according to a Gallup poll, 73% of Americans cited cyberterrorism as a leading threat to vital US interests in the next 10 years. However, what does it really mean when we deduce that there is a threat of cyberterrorism? Do we know who the t...
 3 Aug 2017

Blog post
Today’s headlines often feature the word ‘cyber’, reporting on threats related to the virtual world: online child abuse, stolen credit cards and virtual identities, malware and viruses, botnets and denial-of-service attacks on corporate or government...

Topic page
Governments have placed cybersecurity and cyberconflict at the top of their agendas. Bilateral cyber agreements among lead economies - including the EU, China, India, Japan, Russia, Germany, Canada, and the USA - are on the rise. The number of multil...
 2 Dec 2016

Blog post
Governments have placed cybersecurity and cyberconflict on top of their agendas. Bilateral cyber agreements among lead economies - including the EU, China, India, Japan, Russia, Germany, Canada, and the USA - are on the rise. The number of multilater...
 23 Nov 2016

Event
Competence building for cyberpeace Wednesday, 9th November | 13:00-15:00 CET (12:00-14:00 UTC) Vieira de Mello Auditorium | WMO Building The defense from cyberattacks requires not only cutting-edge IT skills, but also a solid understandin...
 9 Nov 2016

Event
In recent weeks the Chinese government has delivered strong messages about internet sovereignty to both international and domestic audiences. Despite confirming its commitment to working with the rest of the international community “to create a...
 24 Jun 2014

Blog post
What the Tallinn Manual and the DDoS attack against Spamhaus have in common An independent ‘International Group of Experts', invited by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), has recently completed the Tallinn Ma...
 2 Apr 2013

Blog post
We caught up with Diplo’s Vladimir Radunovic who attended the 2nd Belgrade Security Forum at the end of September. The forum was convened to discuss the challenges to democracy and security in this time of global crisis. Vladimir was one of the...
 16 Oct 2012

Blog post
Subscribe to Cyberconflict