architecture, Diplomacy

Security

Stay up to date!

Subscribe to Digital Diplomacy Updates and stay up to date with upcoming events, new publications and research, and Diplo courses and training on digital diplomacy.

From our blog

The Ukraine crisis may shape the future of the internet

Jovan Kurbalija

On 28 February, Deputy Prime Minister of Ukraine Mykhailo Fedorov requested that the Internet Corporation for Assigned Names and Numbers (ICANN) cut Russia’s access to the infrastructure of the global internet. This...

Cyber road from Ukraine: where will it take us?

Vladimir Radunović

‘The potential for the next Pearl Harbor could very well be a cyberattack.’  US Defense Secretary Leon Panetta, 2012 This (in)famous warning has been discussed and re-discussed since 2012. Could a devastati...

Year in review: The digital policy developments that defined 2021

Stephanie Borg Psaila

For most countries, 2021 was a continuation of pandemic woes. As people swapped contact tracing apps for vaccine passports, the wave of misinformation on COVID-19 vaccines spread even faster.  Beyond COVID-19, the b...

Who’s behind a cyberattack?

Anastasiya Kazakova

Unravelling cyberattacks through a simulation game A seemingly ordinary Monday. You enter your office, turn on your computer, and grab a cup of coffee. As you settle in your desk to check your emails and connect to t...

Training and courses

Multilateral Diplomacy online course

Multilateral Diplomacy

Starting 08 May 23

Cybersecurity online course banner

Cybersecurity

Starting 10 Oct 22

Resources

2019

Diplomatic Security under a Comparative Lens – Or Not?

“Diplomatic security” is the term now usually preferred to “diplomatic protection” for the steps taken by states to safeguard the fabric of their diplomatic and consular missions, the lives of their diplomatic and consular officers, and the integrity of their c... Read more...

diplomatic security a comparative analysis, Diplomatic Security: A Comparative Analysis

2018

Searching for Meaningful Human Control. The April 2018 Meeting on Lethal Autonomous Weapons Systems (Briefing Paper #10)

In this briefing paper, Ms Barbara Rosen Jacobson analyses the debate of the April 2018 meeting of the Group of Governmental Experts (GGE) of the Convention on Certain Conventional Weapons (CCW). The group was established to discuss emerging technologies in the area of... Read more...

web page, Diplomacy

2018

The secret life of a cyber vulnerability

The comic brings a worrying, yet realistic and educative story that follows a life of a cyber vulnerability, from its inception to its deployment for an actual cyberattack. ... Read more...

cartoon, Black and white

2017

International multistakeholder cyber threat information sharing regimes: Policy considerations for scaling trust and active participation

This paper examines cybersecurity information sharing mechanisms. It looks at the research into public-private partnership (PPP) theory, their application for cybersecurity, and the burgeoning field of international cybersecurity collaboration, and draws conclusions on... Read more...

university of malta logo, University of Malta

2017

Barriers to conflict resolution in Africa: Mediating beyond power and ethnicity in the EAC and SADC countries through a Kenyan case study

This paper assesses the relevance of ethnicity and power in conflicts occurring in the EAC and SADC regions through a case study of Kenya. It engages with elites’ power contestation and the manner in which power has historically caused violence and instability in Ken... Read more...

university of malta logo, University of Malta

2016

The Embassy: A story of war and diplomacy

This book tells the story of the vital role played by the US Embassy in Monrovia in helping to mediate an end to the brutal, 14-year civil war in Liberia in 2003.... Read more...

ambassador, The Embassy: A Story of War and Diplomacy