Defusing the cybersecurity dilemma game through attribution and network monitoring

States are stuck in a “cybersecurity dilemma”. They can’t reliably distinguish between other states’ offensive and defensive activities. E.g., surveillance or probing being used by a state for defense might look like offensive measures to those states being surveilled or probed. As a result, cyber powers engage in a never...

Regulating cyber through trade regimes

Background The international trade in hardware, software, and content complicates many cybersecurity challenges. Domestic regulations and enforcement may fall short of their intended aims when foreign criminals and governments are out of their jurisdiction, and cheap insecure technologies proliferate worldwide. In response, some security experts have looked to restricting trade...

The flaws and risk in the Kaspersky case

There is a constant drumbeat of Russian threat stories these days, but none is more important to Internet governance than the legal battle between Kaspersky Labs and the United States. It highlights the dangers of nation-states inserting themselves into cybersecurity governance, and shows why the alignment of cybersecurity with nation...

Why aren’t we fixing route leaks?

In case you missed it (you probably didn't), the Internet was hit with the Monday blues this week. As operator-focused lists and blogs identified, At 17:47:05 UTC yesterday (6 November 2017), Level 3 (AS3356) began globally announcing thousands of BGP routes that had been learned from customers and peers and...

IGP wins prize for IoT proposal

From left to right: Ishan Mehta, Karl Grindal and Karim Farhat We all know that allaying security and privacy concerns is decisive if the IoT is ever to deliver on all its hype. Georgia Tech’s Institute for Information Security & Privacy (IISP) is the collaborative focal point behind 11 separate...

VIDEO OF THE MONTH

The cyber norm panel that took place in early February at the Carnegie Endowment for International Peace sheds light on how “cyber norms” came about. States’ negotiations over international cybersecurity strategy evolved from focusing on 'control of weaponization of information technology' to 'managing states’ behavior through cyber norms'. Moreover, it...