From our blog
26 October 2021
Unravelling cyberattacks through a simulation game A seemingly ordinary Monday. You enter your office, turn on your computer, and grab a cup of coffee. As you settle in your desk to check your emails and connect to t...
The UN’s Open-ended Working Group (OEWG) on Developments in the Field of ICTs in the Context of International Security (UN Cyber OEWG) has established another landmark in the international negotiations about the ‘...
Now that everyone’s morning news frequently feature cyberattacks that cause real damage to human health, safety, economic income and threaten nations’ political stability and elections; cybersecurity is finally ma...
One could say that the wish list for cyber-peace was already written in 2015, when states agreed on some rules of behaviour in cyberspace - including that existing international law applies to it. Are we good to go? N...
25 Oct 18 -
01 Oct 18 - 02 Oct 18
12 Apr 18 - 13 Apr 18
16 Apr 18 -
23 Nov 16 -
30 Nov 16 -
20 Sep 12 -
01 Jun 12 -
International multistakeholder cyber threat information sharing regimes: Policy considerations for scaling trust and active participation
This paper examines cybersecurity information sharing mechanisms. It looks at the research into public-private partnership (PPP) theory, their application for cybersecurity, and the burgeoning field of international cybersecurity collaboration, and draws conclusions on... Read more...
International cyber security diplomatic negotiations: Role of Africa in inter-regional cooperation for a global approach on the security and stability of cyberspace
This research paper examines African countries cybersecurity readiness and how Africa can play a role in shaping international negotiations and discussions on global cybersecurity governance.... Read more...