Encryption has once again become a flashpoint between the U.S. government and key tech companies.
The digital age cannot be de-invented, and there can be no individual rights if there is no privacy. How societies deal with this challenge, involving both the positive uses of the digital age, its downside and some terrifying possibilities, is a question for everyone to consider.
The breakup campaign has spawned dozens of antitrust probes against Amazon, Apple, and Google as well as Facebook, and it has started a long-overdue debate about Silicon Valley’s sweeping influence.
Large amounts of data that previously meant nothing can now be converted into information that can help better manage governments and businesses, or determine who wins an election.
It is easy to dismiss “acquisition” as a euphemism for theft, but in reality, trade, foreign investment, licensing, imitation,and, yes, theft have all contributed to China’s technological progress.
The United States and Japan should collaborate with each other to keep their edge, as China increasingly becomes a competitor in high-tech sectors.
In the Netherlands, financial institutions’ desire to test their cyber resilience led to the creation of the Threat Intelligence-Based Ethical Red Teaming (TIBER) framework.
Reliable information and communication technology / operational technology products and services are an indispensable part of modern life. But much of their performance hinges on efficient and secure supply chains that have minimal inadvertent flaws or vulnerabilities and that guard against harmful interventions.
A discussion of ICT supply chain integrity and complementary measures by governments and ICT suppliers on how to reduce systemic risks, restore confidence in the integrity of ICTs, and forestall fragmentation of the marketplace.
Governments across the globe are racing to keep up with the dizzying pace of AI advances. Like the steam engine before it, this technology is changing the world. How should policymakers respond?