Beyond Borders: How Threat Intelligence Provenance Can Save Global Cybersecurity From Geopolitical Fragmentation
In mid-January 2026, the Chinese government allegedly announced a sweeping ban on cybersecurity software from more than a dozen U.S. and Israeli firms, including industry giants like Palo Alto Networks, CrowdStrike, and Check Point. The stated reason: concerns that foreign…
Did an AI application really “bully” a human?
There is a battle over the reputation of advanced AI applications going on in the news. Two worldviews conflict: Are we unleashing dangerous forces that threaten humanity? Or are we just making computers and software do a lot of new…
Digital Media and the American Civil Conflict
Operation “Metro Surge” in Minneapolis-St. Paul, USA, has now attracted national and worldwide attention. Both sides in this conflict see it as a showdown. It is a showdown, and it matters who wins. In this blog, we try to focus on…
Identity Engineering: Why a leading Chinese AI startup abandons its home market
The Chinese AI and venture capital community was shocked by Meta’s swift acquisition of Manus, an AI agent company from Wuhan, China, in a deal worth an estimated $2–3 billion. For Meta, this deal is its third-largest acquisition to date….
Don’t Renew the Cybersecurity Information Sharing Act
The Cybersecurity Information Sharing Act of 2015 (CISA 2015) was enacted during a period of heightened anxiety over massive state-sponsored breaches and the burgeoning threat of global ransomware. Its architects envisioned a nationwide “digital neighborhood watch,” where private companies and…
IGP Year in Review (2025)
The Internet Governance Project’s coverage in 2025 documents a troublesome ongoing global shift from “multistakeholder” governance and ICT liberalization norms toward an era characterized by aggressive techno-nationalism and state-centric control over networks, software applications, and expression. However, there were also…
