Advertisement · 728 × 90
#
Hashtag
#CyberGovernance
Advertisement · 728 × 90
Preview
Russia promotes Max platform as questions grow over user data security   Russian daily communication has been disrupted in recent weeks, as familiar digital channels are experiencing problems under mounting regulatory pressure, disrupting the rhythms of everyday communication.  What appears at first glance to be a technical inconvenience is in fact a deliberate realignment of the country's information ecosystem that has been going on for several years. A domestically developed alternative known as Max has been elevated by authorities in parallel to globally embedded messaging platforms such as WhatsApp and Telegram, while authorities restrict access to these platforms.  There is no subtlety or incident in the shift. It is an assertive attempt to redefine the boundaries of digital interaction within the state's sphere of influence. Millions of users are directed towards a platform that remains closely aligned with Kremlin interests in terms of architecture and governance. With Max, introduced in 2025 by VK, the platform becomes much more than just a conventional messaging platform, marking a significant escalation in this strategy. By consolidating communication tools with state-linked utilities, such as access to government services, financial transactions, and the development of a digital identity framework, it provides the functionality of an integrated digital ecosystem. Despite bearing structural similarities to WeChat, the implementation is in line with Moscow's long-standing pursuit of technological autonomy. Although adoption is a voluntary process, infrastructure incentives and regulatory constraints have combined to create conditions in which disengagement has become increasingly difficult. A secure and sovereign alternative has been framed by endorsements from Vladimir Putin, reinforcing the policy direction, as noted by internet governance scholar Marielle Wijermars, that has culminated efforts to reconfigure the nation's internet architecture toward tighter state oversight.  As part of the transition, technical integration and controlled accessibility are being implemented. Max has been pre-installed on numerous domestically sold consumer devices since September, reducing entry barriers while subtly standardizing its presence.  A number of features are included in the interface, including private messaging, broadcast channels, and user engagement, which minimize friction for new users as it mimics established platforms. However, its differentiation lies in its privileged network status: by being included on Russia's approved "white list," the company ensures uninterrupted connectivity during periodic connectivity restrictions, which authorities attribute to defensive measures against external threats.  Furthermore, geopolitical considerations also play a role, as initial restrictions on Russian and Belarusian SIM cards have been expanded selectively to a limited group of countries who are considered politically aligned.  Although the platform has been widely distributed in countries such as the European Union and Ukraine, these markets are notably absent, even as the platform becomes enmeshed in larger information dynamics, including its perceived role as a means of countering rival cross-border coordination applications such as Telegram and WhatsApp.  Russia itself continues to receive uneven receptions, suggesting an increasing divide between state-driven digital consolidation and a population long accustomed to more open communication systems. As a result of this transition, established communication patterns are disrupted, which has already begun to affect professionals who rely on continuity and reliability as part of their workflows.  Before routine connectivity began to fail without warning, Marina, a freelance copywriter based in Tula, had been relying on WhatsApp for both client interactions and personal exchanges. There has also been little success in shifting conversations to Telegram, reflecting a broader trend experienced by millions as Roskomnadzor imposed restrictions on voice and messaging functions across the country's most widely used platforms in mid-August.  There have been concerns about the timing of these limitations, which coincide with the rapid deployment of the state-backed Max ecosystem. With WhatsApp's user base estimated at approximately 97 million, and Telegram's user base estimated at 90 million, this disruption goes far beyond inconvenience, reaching into the foundations of social and economic interaction on a daily basis.  These platforms have been providing informal digital backbones for many years, facilitating everything from family coordination and residential management groups to hyperlocal commerce in areas lacking conventional internet access. For example, message applications often serve as a substitute for broader digital infrastructure in remote parts of the Russian Far East, enabling services such as ride coordination and small-scale transactions as well as information sharing within the community.  In addition to implementing end-to-end encryption, both platforms have also implemented security architectures that prevent intermediaries, including service providers, from gaining access to communications' contents.  Russian authorities assert that the restrictions are justified by compliance failures, particularly the refusal to localize user data within national borders, along with concerns over fraud. Based on available financial sector data, however, most scams remain perpetrated through traditional mobile networks rather than encrypted applications, according to data available to the financial sector.  Analysts and segments of the public view these measures as part of a broader effort to improve visibility into interpersonal networks and information flows, with a less technical but more strategic interpretation. According to Marina, who requested anonymity due to concerns about possible consequences, the shift is not simply one of technology, but one of social space narrowing, with the ability to maintain connections outside of state-mediated channels gradually becoming increasingly restricted.  Through regulatory pressure as well as institutional dependency, Max is being reinforced within everyday workflows.  To maintain access to essential services, individuals across sectors report a growing requirement for the platform. In her experience, Irina describes being forced to utilize Max to communicate with her children's school communications and navigate the Gosuslugi, where patient appointments are increasingly coordinated.  Across corporate and educational environments, similar patterns are emerging as employers and schools standardize their internal communication platforms. The public visibility of Max is also increasing as celebrities and digital influencers migrate their content ecosystems to Max, enhancing its normalization, parallel to this structural push.  According to analysts such as Dmitry Zakharchenko, the campaign has been unusually strong, comparing it to the centrally orchestrated messaging efforts of earlier eras, which has nonetheless been able to accelerate adoption to approximately 100 million users within a short period of time.  In terms of technical characteristics, the platform represents a broader trajectory of Russia's "sovereign internet" initiative, which prioritizes control over data flows and infrastructure over international interoperability. As opposed to Telegram and WhatsApp, Max does not utilize end-to-end encryption technology, and its data governance framework requires that all user information be stored on domestic servers, thereby making it subject to the jurisdiction of government regulators and security agencies.  Many users express only a limited level of concern, regarding compliance as inconsequential when there is no perceived risk. However, others have sought alternatives, including IMO, or have refused to adopt Max altogether. However, this resistance appears to be increasingly constrained as Max's structural integration into critical services increases. Even among skeptics, prevailing sentiment indicates that participation may soon become unavoidable as the country's digital environment narrows toward a state-defined center of gravity. For policymakers, technologists, and civil society observers, Max's trajectory provides a valuable example of how digital sovereignty and user autonomy are evolving in an increasingly dynamic environment.  By rapidly integrating the platform into essential services, people can see how infrastructure can be a subtly effective tool for shaping behavioral compliance, particularly when alternatives are systematically restricted. As a result, centralized control over communication ecosystems raises further concerns regarding transparency, data governance, and long-term consequences.  Russia is likely to continue to grapple with a defining tension as they advance this model in order to balance national security objectives with individual privacy rights. This type of system will ultimately be determined by the level of state enforcement as well as the level of trust among users, the resilience of alternative networks, and the worldwide response to fragmented digital environments.

Russia promotes Max platform as questions grow over user data security #CyberGovernance #datalocalization #DigitalSovereignty

0 0 0 0
Post image

Thank you to everyone who joined our ISSA Privacy SIG live insider session on Implicative Data.

Emerging tech is reshaping privacy risk — often invisibly.
Watch now: issa.org/event/introd...
Stay tuned for upcoming sessions.
#ISSAINTL #PrivacyLeadership #CyberGovernance 🔗

0 0 0 0
Post image

Succeed in the boardroom.
Clear insight into fiduciary responsibilities
Practical guidance for aspiring board members
A stronger understanding of board-level risk and accountability
Brings clarity to an often opaque process.
👉 issa.org/event/duties...
#ISSAINTL #CyberGovernance

0 0 0 0
Judgment, Governance, and Accountability: A Founder’s Perspective on What Boards Worry About, AI Defense, and Mentorship Bltz AI CEO & Founder, Arlene Watson, discusses overlooked AI governance risks, and why human judgment remains critical in AI defense.

Read the full interview :
www.technadu.com/judgment-gov...

What do you think organizations underestimate the most about AI security today? Share your thoughts in the comments.
#InternationalWomensDay #WomenInCybersecurity #AISecurity #CyberGovernance #EnterpriseSecurity #TechNadu

0 0 0 0
Post image

If you’ve ever wondered:
• What boards actually expect from directors
• How oversight differs from micromanagement
• What questions board members should consistently ask leadership
This session is for you.
👉 issa.org/event/duties...
#ISSAINTL #BoardService #ExecutiveLeadership #CyberGovernance

0 0 0 0
Preview
The CISO role keeps getting heavier - Help Net Security CISO liability concerns rise as AI governance expands and risk management pressures grow across security operations and boards.

CISO liability risk is rising — regulatory pressure and breach fallout are putting security leaders in the legal spotlight. Accountability now extends to the boardroom. ⚖️🛡️ #CISO #CyberGovernance

0 0 0 0
Preview
Beyond “Think Before You Click” "Think Before You Click" your only line of defence? Most organizations tell their staff to "think before they click." But for a Board of Directors, the responsibility is different. It’s not just about the individual click—it’s about the strategy, resources, and recovery models that sit behind it. Cybersecurity is no longer a technical line item; it is a fiduciary imperative. Yet, many boards are operating with a significant visibility gap regarding their organization's actual capabilities. In my latest blog, I encourage you to explore: *Strategy vs. Operating Model: Do you know who is actually doing what within your IT organization? *The Risk Register Audit: How to ensure leadership decisions actually align with your Board’s risk appetite. *The Resource Assumption: Why you should assume your CISO is under-resourced and how to bridge that gap. *The Restoration Hierarchy: The disciplined order of operations required to switch systems back on safely after an attack. Don't wait for a crisis to find out if your "on" switch works. Read the Full Post: Beyond Think Before You Click And if you’d like to talk through your priorities for the year ahead, or how I can support you, you can reach me directly at this email lizhendersondata@yahoo.com or use the contact form on my website.

The "Boardroom Reality Check"
Staff clicking links is a symptom; a fragmented operating model is the disease.

Cybersecurity governance is a Board-level fiduciary duty. Do you know your Restoration Hierarchy?
Do your CISO’s decisions align with your risk appetite?
#Cybergovernance #risk

0 0 0 0
Post image

NIS2 puts cybersecurity accountability on leadership. Infosec K2K enables executive oversight through IAM assessments, access governance, and continuous control validation to ensure compliance and reduce risk.

#NIS2 #IAM #CyberGovernance #ExecutiveRisk #InfosecK2K

1 0 0 0
Preview
Book Review - The Invisible War: Cyber Attacks and the New Age of Conflict - Stratheia A review of The Invisible War explores how cyber-attacks redefine modern warfare, deterrence, and state power in the digital age.

Attribution, legality, and accountability remain unresolved in cyberspace, exposing gaps in international law and global governance.
#InternationalLaw #CyberGovernance #GlobalSecurity
stratheia.com/book-review-...

0 0 0 0
Preview
Book Review - Cyberspace and Cybersecurity - Stratheia A critical review of Kostopoulos’ Cyberspace and Cybersecurity exploring cyber risks, power, law, warfare, and governance.

Most cyber failures don’t happen because of weak technology—but because of weak policies, poor leadership, and human negligence. Cybersecurity starts with organizations, not machines.
#CyberRisk #LeadershipMatters #CyberGovernance
stratheia.com/book-review-...

1 0 0 0
Preview
Cybersecurity Falls Behind as Threat Scale Outpaces Capabilities Cyber defence is entering its 2026 year with the balance of advantage increasingly being determined by speed rather than sophistication. With the window between intrusion and impact now measured in minutes rather than days instead of days, the advantage is increasingly being gained by speed.  As breakout times fall below an hour and identity-based compromise replaces malware as the dominant method of entry into enterprise environments, threat actors are now operating faster, quieter, and with greater precision than ever before.  By making use of artificial intelligence, phishing, fraud, and reconnaissance can be executed at unprecedented scales, with minimal technical knowledge, which is a decisive accelerator for the phishing, fraud, and reconnaissance industries. As a result of the commoditization, automation, and availability of capabilities once requiring specialized skills, they have lowered the barrier to entry for attackers dramatically.  There is an increased threat of "adaptive, fast-evolving threats" that organizations must deal with, and one of the main factors that has contributed to this is the rapid and widespread adoption of artificial intelligence across both offensive and defensive cyber operations. Moody's Ratings describes this as leading to a "new era of adaptive, fast-evolving threats".  A key reality for chief information security officers, boards of directors, and enterprise risk leaders is highlighted in the firm's 2026 Cyber Risk Outlook: Artificial intelligence isn't just another tool in cybersecurity, but is reshaping the velocity, scale, and unpredictability of cyber risk, impacting both the management, assessment, and governance of cyber risks across a broad range of sectors.  While years have been spent investing and innovating in enterprise security, the failure of enterprise security rarely occurs as a consequence of a lack of tools or advanced technology; rather, failure is more frequently a result of operating models that place excessive and misaligned expectations on human defenders, forcing them to perform repetitive, high-stakes tasks with fragmented and incomplete information in order to accomplish their objectives.  Modern threat landscapes have changed considerably from what was originally designed to protect static environments to the dynamic environment the models were built to protect. Attack surfaces are constantly changing as endpoints change their states, cloud resources are continually being created and retired, and mobile and operational technologies are continuously extending exposures well beyond traditional perimeters.  There has been a gradual increase in threat actors exploiting this fluidity, putting together minor vulnerabilities one after another, confident that eventually defenders will not be able to keep up with them.  A huge gap exists between the speed of the environment and the limits of human-centered workflows, as security teams continue to heavily rely on manual processes for assessing alerts, establishing context, and determining when actions should be taken.  Often, attempts to remedy this imbalance through the addition of additional security products have compounded the issue, increasing operational friction, as tools overlap, alert fatigue is created, and complex handoffs are required.  Despite the fact that automation has eased some of this burden, it still has to do with human-defined rules, approvals, and thresholds, leaving many companies with security programs that may appear sophisticated at first glance but remain too slow to respond rapidly, decisively, in crisis situations. Various security assessments from global bodies have reinforced the fact that artificial intelligence is rapidly changing both cyber risk and its scale. In a report from Cloud Security Alliance (CSA), AI has been identified as one of the most important trends for years now, with further improvements and increased adoption expected to accelerate its impact across the threat landscape as a whole. It is cautioned by the CSA that, while these developments offer operational benefits, malicious actors may also be able to take advantage of them, especially through the increase of social engineering and fraud effectiveness.  AI models are being trained on increasingly large data sets, making their output more convincing and operationally useful, and thus making it possible for threat actors to replicate research findings and translate them directly into attack campaigns based on their findings. CSA believes that generative AI is already lowering the barriers to more advanced forms of cybercrime, including automated hacking as well as the potential emergence of artificial intelligence-enabled worms, according to the organization.  It has been argued by David Koh, Chief Executive of the Cybersecurity Commissioner, that the use of generative artificial intelligence brings to the table a whole new aspect of cyber threats, arguing that attackers will be able to match the increased sophistication and accessibility with their own capabilities.  Having said that, the World Economic Forum's Global Cybersecurity Outlook 2026 is aligned closely with this assessment, whose goal is to redefine cybersecurity as a structural condition of the global digital economy, rather than treating it as a technical or business risk. According to the report, cyber risk is the result of convergence of forces, including artificial intelligence, geopolitical tensions, and the rapid rise of cyber-enabled financial crime.  A study conducted by the Dublin Institute for Security Studies suggests that one of the greatest challenges facing organizations is not the emergence of new threats but rather the growing inadequacy of existing business models related to security and governance.  Despite the WEF's assessment that the most consequential factor shaping cyber risk is the rise of artificial intelligence, more than 94 percent of senior leaders believe that they can adequately manage the risks associated with AI across their organizations. However, fewer than half indicate that they feel confident in their ability to manage these risks. According to industry analysts, including fraud and identity specialists, this gap underscores a larger concern that artificial intelligence is making scams more authentic and scaleable through automation and mass targeting. These trends, taken together, indicate that organizations are experiencing a widening gap between the speed at which cyber threats are evolving and their ability to identify, respond, and govern them effectively as a result.  Tanium offers one example of how the transition from tool-centered security to outcome-driven models is taking shape in practice, reflecting a broader shift from tool-centric security back to outcomes-driven security. This change in approach exemplifies a growing trend of security vendors seeking to translate these principles into operational reality.  In addition to proposing autonomy as a wholesale replacement for established processes, the company has also emphasized the use of real-time endpoint intelligence and agentic AI as a method of guiding and supporting decision-making within existing operational workflows in order to inform and support decision-making.  The objective is not to promote a fully autonomous system, but rather to provide organizations with the option of deciding at what pace they are ready to adopt automation. Despite Tanium leadership's assertion that autonomous IT is an incremental journey, one involving deliberate choices regarding human involvement, governance, and control, it remains an incremental journey.  The majority of companies begin by allowing systems to recommend actions that are manually reviewed and approved, before gradually permitting automated execution within clearly defined parameters as they build confidence in their systems.  Generally, this measured approach represents a wider understanding of the industry that autonomous systems scale best when they are integrated directly into familiar platforms, like service management and incident response systems, rather than being added separately as a layer.  Vendors are hoping that by integrating live endpoint intelligence into tools like ServiceNow, security teams can shorten response times without requiring them to reorganize their operations. In essence, this change is a recognition that enterprise security is about more than eliminating complexity; it's about managing it without exhausting the people who need to guard increasingly dynamic environments.  In order to achieve effective autonomy, humans need not be removed from the loop, but rather effort needs to be redistributed. It has been observed that computers are better suited for continuous monitoring, correlation, and execution at scale, while humans are better suited for judgment, strategic decision-making, and exceptional cases, when humans are necessary.  There is some concern that this transition will not be defined by a single technological breakthrough but rather by the gradual building up of trust in automated decisions. It is essential for security leaders to recognize that success lies in creating resilient systems that are able to keep up with the ever-evolving threat landscape and not pursuing the latest innovation for its own sake.  Taking a closer look ahead, organizations are going to realize that their future depends less on acquiring the next breakthrough technology, but rather on reshaping how cyber risk is managed and absorbed by the organization. In order for security strategies to be effective in a real-world environment where speed, adaptability, and resilience are as important as detection, they must evolve. Cybersecurity should be elevated from an operational concern to a board-level discipline, risk ownership should be aligned to business decision-making, and architectures that prioritize real-time visibility and automated processes must be prioritized.  Furthermore, organizations will need to put more emphasis on workforce sustainability, and make sure that human talent is put to the best use where it can be applied rather than being consumed by routine triage.  As autonomy expands, both vendors and enterprises will need to demonstrate that they have the technical capability they require, as well as that they are transparent, accountable, and in control of their business.  Despite the fact that AI has shaped the environment, geopolitics has shaped economic crime, and economic crime is on the rise, the strongest security programs will be those that combine technological leverage with disciplinary governance and earned trust.  It is no longer simply necessary to stop attacks, but rather to build systems and teams capable of responding decisively in a manner that is consistent with the evolving threat landscape of today.

Cybersecurity Falls Behind as Threat Scale Outpaces Capabilities #AIDrivenThreats #ArtificialIntelligenceSecurity #CyberGovernance

0 0 0 0
Post image

From ransomware disruptions to government cyber reform and a diplomatic prisoner swap tied to an unresolved ransomware case - cyber accountability keeps expanding.

#CyberSecurity #CyberGovernance #Ransomware #DigitalPolicy

0 0 1 0
Preview
Proxy SROs, real accountability, and why cyber risk keeps slipping through delivery cracks | Advent IM Why cyber risk slips through delivery cracks, the real role of SROs, and how Proxy SRO models help maintain accountability and resilience.

Cyber risk isn’t an IT surprise — it’s a delivery outcome. When SRO accountability is nominal, risk drifts and assurance turns into theatre.

🔗 www.advent-im.co.uk/proxy-sros-r...
✍️ Ellie Hurst, Commercial Director

#CyberGovernance #SRO #SecureByDesign

0 0 0 0
UK Government Admits Flaws in Cyber Resilience Strategy, Overhauls Cyber Policy with New Action Plan The U.K. government has announced a new Cyber Action Plan to overhaul its cybersecurity strategy, addressing legacy IT issues and centralizing accountability.

Details:
www.technadu.com/uk-governmen...

#UKCyber #CyberResilience #PublicSectorSecurity #Infosec #CyberGovernance

0 0 0 0
Preview
The Emerging Law on Cyberterrorism - Stratheia Cyberterrorism laws prioritize security, raise concerns over broad definitions, surveillance powers, and compliance with international law.

Bridging national cyber laws with international standards is essential for a secure, lawful, and rights-respecting digital future.
#CyberGovernance #GlobalNorms #HumanRights
stratheia.com/the-emerging...

0 0 0 0
Preview
Cyber Attacks will bring you down About 55 years ago (yes, I’m that old) the Rolling Stones recorded Sympathy for the Devil. That’s not what this is about.

What will it take for biz to take #cybersecurity seriously? They all say how they take it seriously. They make a tweak & have another. WHY? They're on an easy target list. Learn what you MUST do & the effects you face #databreach #SEC #NYDFS #cybergovernance #Boards www.linkedin.com/pulse/cyber-...

0 0 0 0
Post image

Next week in Cyber Governance in Practice, we break down the risks of your GRC data supply chain & what MSSPs & enterprises should be doing instead

Subscribe now to get the full article when it drops on August 6:
🔗 lnkd.in/gNxtjw7A

#cloudsecurity #cybergovernance #MSSP #GRC #infosec #substack

1 0 0 0
Preview
Governing the Shadows & Crafting AI Malware Governance for a Secure Digital Future As AI-powered malware accelerates in sophistication, the call for structured, ethical, and proactive governance grows louder

As AI threats evolve, so must our defense frameworks. Proactive governance, ethical oversight & robust threat modeling are key to staying ahead in the cybersecurity arms race.
#AIMalware #CyberGovernance #DigitalSecurity #BlueskyTech #AIethics #CyberLens

cyberlens.beehiiv.com/p/governing-...

0 0 0 0
Preview
Why banks’ tech-first approach leaves governance gaps - Help Net Security Banks struggle to align cybersecurity with governance when cyber is viewed as tech-only, not part of banking risk or cyber governance.

Why banks’ tech-first approach leaves governance gaps

📖 Read more: www.helpnetsecurity.com/2025/06/16/r...

#cybersecurity #cybersecuritynews #cybergovernance #banking

1 0 0 0
Preview
Cyber Attacks will bring you down About 55 years ago (yes, I’m that old) the Rolling Stones recorded Sympathy for the Devil. That’s not what this is about.

What will it take for biz to take #cybersecurity seriously? They all say how they take it seriously. They make a tweak, & have another. WHY? They're on an easy target list. Learn what you MUST do & the effects you face #databreach #SEC #NYDFS #cybergovernance #Boards www.linkedin.com/pulse/cyber-...

0 0 0 0
Cyber Insights Today May 20, 2025

mailchi.mp/7faf604ed313...
Welcome back to our Cybersecurity weekly Series! Enjoy this week's podcast addressing 5 of the most prominent and potentially damaging threats businesses are facing.. LIKE IT! POST a comment or question & SHARE!
#cybergovernance #cyberresiliency #darkweb #ransomware

0 0 0 0
Preview
Booz Allen and Merck's AI Security & Governance Workshop Join us at Booz Allen's AI Workshop in Austin to share and network with your peers from across the critical infrastructure sectors.

🎓 Join @boozallenhamilton.bsky.social & Merck for a hands-on AI Security & Governance Workshop.
📅 June 11 8 - 5 CDT | Space is limited

Register & secure your spot, here 👉🏼 www.eventbrite.com/e/booz-allen...

#AIsecurity #CyberGovernance #RHISAC

0 0 0 0
Post image

🚨 Data = National Security. The DOJ's new Data Security Program is more than privacy—it's a compliance revolution. Is your org ready for Oct 6, 2025? Start now or risk falling behind. 🔍

Read: https://bit.ly/43up74Z #DSPCompliance #DataSecurity #RiskManagement #CyberGovernance

0 0 0 0
Video

📱 Why a global geopolitical #spyware campaign could ensnare mobile users outside of its target groups
🇬🇧 U.K. cyber agency offers #cybergovernance resources to boards of directors

🔗: http://spr.ly/63320FFhps

0 0 0 0
Post image

UK Government launches Cyber Governance Code of Practice to help businesses improve cyber resilience: resilienceforward.com/uk-governmen...

#CyberResilience #Governance #CyberGovernance #Director

1 0 0 0
Preview
Cybersecurity Compliance Simplified: Protect Your Digital Foot Print Ever stopped to think about how many times a day you're online? Sending emails, posting on social media, shopping or even just chatting, every click leaves a trail. Have you ever wondered who keeps yo...

Cybersecurity Compliance Simplified: Protect Your Digital Foot Print

#CybersecurityCompliance, #DigitalSafety, #CyberGovernance, #SecurityFrameworks, #CyberAware, #OnlineProtection, #DataSecurity, #CyberDefense, #SecureDigitalLife

www.linkedin.com/pulse/cybers...

0 0 0 0

🚨 Colombia Publishes National Position on International Cyber Law 🌍💻

Colombia joins the growing list of States outlining how international law applies in cyberspace, addressing sovereignty, non-intervention, and IHL in cyber conflicts. #CyberSecurity #InternationalLaw #CyberGovernance

0 0 0 0
Trump shuts down cyber agency investigating Chinese hack of government Any further work would only be approved if it were found to be “advancing our critical mission to protect the homeland and support DHS’s strategic priorities.”

Read more: www.itbrew.com/stories/2025...

#Cybersecurity #NationalSecurity #InfoSec #CyberDefense #CyberIntelligence #TechPolicy #CyberGovernance #NetworkSecurity #CyberThreats #TechNews

0 0 0 0
Preview
Pell Mell or Pas Mal? Governing commercial cyber intrusion capabilities Binding Hook Managing Editor James Shires puts forward principles for how states should govern cyber-intrusion technologies

James Shires proposes principles for responsible state use of cyber intrusion capabilities. They include aligning with OECD guidelines & UN norms, promoting transparency, oversight, and legal accountability. #ResponsibleTech #CyberGovernance bindinghook.com/articles-bin...

1 2 0 1