Governments have embraced digital surveillance tools such as contact tracing apps in their response to the coronavirus pandemic. However, these technologies raise serious concerns related to the outsourcing of sensitive data and the potential infringement of human rights.
The EU needs a disinformation strategy that is adaptable and built to last.
EU officials must coordinate better to mount an effective collective response to disinformation campaigns and influence operations throughout Europe.
Most organizations—governments and companies—struggle to protect themselves against efforts to undermine their information systems. Few organizations can rival the security teams of the large cloud service providers, so many opt to entrust these teams with their security.
With the potential of enabling not only significant economic growth but also the innovation of critical technologies in various fields, both the United States and China view 5G as one of the key influencing factors in the “great power competition.”
Join us for a conversation with Mira Rapp-Hooper and Rebecca Lissner as they discuss how the U.S. can revitalize its foreign policy, rewrite the global rules for a new era, and rise to the challenges of the 21st century.
As cloud computing becomes more prevalent, its advantages and drawbacks have been forced into the limelight. What makes the cloud so secure and what are the risks that it is vulnerable to?
Using the concept of ‘governance’ as an analytical framework, this book investigates how new and emerging security technologies are governed within the European Union, emphasizing relations among different state and non-state actors.
Although cyberspace represents a relatively new facet of the U.S.-China relationship, controversies within this domain have rapidly evolved into critical and contentious issues in the eyes of both parties, affecting a wide swath of policy areas such as trade, defense, transparency, and the rule of law.
The shift to cloud computing has helped improve cybersecurity, but it isn't without risk. Mapping out those risks and their impacts is vital to ensuring the cloud remains safe and secure.