Cybernorms

Stay up to date!

Subscribe to DiploNews and stay up-to-date with upcoming events, new publications and research, and courses and training.

From our blog

Cyber road from Ukraine: where will it take us?

Vladimir Radunović

‘The potential for the next Pearl Harbor could very well be a cyberattack.’  US Defense Secretary Leon Panetta, 2012 This (in)famous warning has been discussed and re-discussed since 2012. Could a devastati...

Year in review: The digital policy developments that defined 2021

Stephanie Borg Psaila

For most countries, 2021 was a continuation of pandemic woes. As people swapped contact tracing apps for vaccine passports, the wave of misinformation on COVID-19 vaccines spread even faster.  Beyond COVID-19, the b...

Who’s behind a cyberattack?

Anastasiya Kazakova

Unravelling cyberattacks through a simulation game A seemingly ordinary Monday. You enter your office, turn on your computer, and grab a cup of coffee. As you settle in your desk to check your emails and connect to t...

What’s new with cybersecurity negotiations? UN Cyber OEWG Final Report analysis

Pavlina Ittelson

The UN’s Open-ended Working Group (OEWG) on Developments in the Field of ICTs in the Context of International Security (UN Cyber OEWG) has established another landmark in the international negotiations about the ‘...

Training and courses

Resources

2019

International cyber security diplomatic negotiations: Role of Africa in inter-regional cooperation for a global approach on the security and stability of cyberspace

This research paper examines African countries cybersecurity readiness and how Africa can play a role in shaping international negotiations and discussions on global cybersecurity governance.... Read more...

Food, Ketchup, Logo, Armor

2017

International multistakeholder cyber threat information sharing regimes: Policy considerations for scaling trust and active participation

This paper examines cybersecurity information sharing mechanisms. It looks at the research into public-private partnership (PPP) theory, their application for cybersecurity, and the burgeoning field of international cybersecurity collaboration, and draws conclusions on... Read more...

Food, Ketchup, Logo, Armor