View Post

Upping the Ante on EU Cyber Defence: What Should we Expect from our Capitals?

Caitriona Heinl Commentary

The obvious importance of cyber defence – often the poor cousin of all things cyber – is becoming clearer and more entrenched, with growing high-level EU ambitions. The recent release of the EU cyber defence policy in late 2022 marks a milestone for the EU’s cyber defence policy framework insofar as its ambitions indicate the aspirational direction of travel for …

View Post

A Cybersecurity Strategy for the 21st Century

James A. Lewis Commentary

The Biden Administration’s ambitious new National Cybersecurity Strategy will significantly improve cyber defence. Written for cyberspace as it exists and operates now, it abandons the previous emphasis on deterrence, which has not worked, and focuses on resilience and regulation. It also shifts important security responsibilities to developers and providers of IT services and products, and creates new opportunities for close …

View Post

Ukraine Cyber War One Year On: An International Law Case Study

Joanna Kulesza Commentary

Russia committed a grave violation of international law when it invaded Ukraine one year ago. Russia and Ukraine are at war, but are they also at cyber war? We have seamlessly passed the much-debated Article 51 UNC threshold and moved into a cyber warzone, where shelling of Ukrainian towns and villages is accompanied by cyberattacks on its allies’ critical infrastructure. …

View Post

International Cooperation and Cybersecurity in Africa

Nnenna Ifeanyi-Ajufo Commentary

International cooperation efforts have increasingly focused on cybersecurity in Africa. Despite the diversity of these initiatives, Africa has yet to prioritise cybersecurity. Without coordination and accountability, divergent cybersecurity visions and models may instead derail Africa’s cybersecurity development. Africa, cooperation and cybersecurity In March 2022, the First African Cybersecurity Summit was held in Lomé, Togo. A core purpose of the Summit …

View Post

Taiwan, China and Semiconductors

John Lee Commentary

Rising tensions surrounding Taiwan in the wake of Nancy Pelosi’s visit have illuminated the island’s critical role in the global economy, thanks to its singular place in the semiconductor supply chain. Yet rather than increasing Beijing’s incentives to pull the trigger on an invasion of Taiwan, the global importance of TSMC and other Taiwanese semiconductor companies discourages it. Taiwan’s position …

View Post

Cybersecurity Cooperation in the Indian Ocean

Asela Waidyalankara Commentary

Formal and informal regional organisations play an increasing role in shaping global debates about cybersecurity. Although countries in the Indo-Pacific region have varied levels of cyber maturity, they share similar cybersecurity challenges and needs. It is not surprising, therefore, that existing cooperation platforms – like the Colombo Security Conclave – increasingly also include a cybersecurity dimension. India’s role in this …

View Post

How Does War in Ukraine Impact the EU’s Digital Sovereignty?

Editors Opinions

The Russian war against Ukraine is changing the understanding of what it means to be sovereign in the digital domain. Technology is being deployed and shaped by both sides to transcend traditional dividing lines and change the terms of conflict. To become strategically autonomous, Europe must learn this new topography and ways to navigate it. Only then may Europe mitigate …

View Post

Are Internet Sanctions a Good Idea?

Editors Opinions

Shortly after the Russian Federation launched its invasion of Ukraine, the government of Ukraine made several public calls for support, including pleas for the global internet governance bodies – ICANN and the RIPE NCC – to restrict Russia’s access to and use of the Domain Names System (DNS) and de-register the Internet Protocol (IP) address resources of Russian network operators. …

View Post

The Curious Absence of Chinese Cyber Deterrence

Juha Vuori Commentary

While China’s political and academic discourse on cybersecurity uses many of the same concepts as other countries’, the notion of deterrence is largely missing from its vocabulary. This can be explained by China’s relative vulnerability to cyberattacks: deterrence through denial lacks credibility and deterrence through punishment would be counter-productive. China has chosen instead to promote an international convention on interstate …

View Post

Ukraine: Cyber Operations and Digital Technologies

Camino Kavanagh Commentary

Towards the end of 2021, Russia began a military build-up around Ukraine. Then, after several months unsuccessfully pressuring the Ukrainian government to accede to its demands, Russia invaded Ukraine on 24 February 2022. This post collects and synthesises information and perspectives on the cyber and information technology-related aspects of the conflict thus far, including the cyber operations and tactics of …