Articles Africa’s Cybersecurity Treaty Enters into Force Africa’s Cybersecurity treaty, adopted in 2014, finally enters into force, with 15 of 55 member states ratifying Nnenna Ifeanyi-Ajufo | 21 September 2023 Why EU Cyber Policy Should Become Feminist A feminist EU cyber policy not only contributes to a stable cyberspace, but to a more peaceful and just world Jennifer Menninger & Veronika Datzer | 12 July 2023 Coordinated Vulnerability Disclosure: A Quick Win for Cyber Norms and Software Security States that are serious about their commitment to secure software supply chains should promote coordinated vulnerability disclosure practices Alexandra Paulus & Bart Hogeveen | 6 July 2023 Disruptive Technologies in Security and Defence: Preparing for ‘Known Unknowns’ Analytical uncertainties on EDTs abound. States can better structure national security and defence approaches for the breadth of EDTs Caitriona Heinl | 22 June 2023
Africa’s Cybersecurity Treaty Enters into Force Africa’s Cybersecurity treaty, adopted in 2014, finally enters into force, with 15 of 55 member states ratifying Nnenna Ifeanyi-Ajufo | 21 September 2023 Why EU Cyber Policy Should Become Feminist A feminist EU cyber policy not only contributes to a stable cyberspace, but to a more peaceful and just world Jennifer Menninger & Veronika Datzer | 12 July 2023 Coordinated Vulnerability Disclosure: A Quick Win for Cyber Norms and Software Security States that are serious about their commitment to secure software supply chains should promote coordinated vulnerability disclosure practices Alexandra Paulus & Bart Hogeveen | 6 July 2023 Disruptive Technologies in Security and Defence: Preparing for ‘Known Unknowns’ Analytical uncertainties on EDTs abound. States can better structure national security and defence approaches for the breadth of EDTs Caitriona Heinl | 22 June 2023