IGF Mauritius

Internet Governance Forum Mauritius

Year: 2026

Cybersecurity Geopolitics of IG

Beyond Borders: How Threat Intelligence Provenance Can Save Global Cybersecurity From Geopolitical Fragmentation

In mid-January 2026, the Chinese government allegedly announced a sweeping ban on cybersecurity software from more than a dozen U.S. and Israeli firms, including industry giants like Palo Alto Networks, CrowdStrike, and Check Point. The stated reason: concerns that foreign…

Cybersecurity Generative AI

Did an AI application really “bully” a human?

There is a battle over the reputation of advanced AI applications going on in the news. Two worldviews conflict: Are we unleashing dangerous forces that threaten humanity? Or are we just making computers and software do a lot of new…

Digital Media and the American Civil Conflict

Operation “Metro Surge” in Minneapolis-St. Paul, USA, has now attracted national and worldwide attention. Both sides in this conflict see it as a showdown. It is a showdown, and it matters who wins.   In this blog, we try to focus on…

Digital Trade Geopolitics of IG

Identity Engineering: Why a leading Chinese AI startup abandons its home market

The Chinese AI and venture capital community was shocked by Meta’s swift acquisition of Manus, an AI agent company from Wuhan, China, in a deal worth an estimated $2–3 billion. For Meta, this deal is its third-largest acquisition to date….

Cybersecurity Privacy & Surveillance

Don’t Renew the Cybersecurity Information Sharing Act

The Cybersecurity Information Sharing Act of 2015 (CISA 2015) was enacted during a period of heightened anxiety over massive state-sponsored breaches and the burgeoning threat of global ransomware. Its architects envisioned a nationwide “digital neighborhood watch,” where private companies and…

General

IGP Year in Review (2025)

The Internet Governance Project’s coverage in 2025 documents a troublesome ongoing global shift from “multistakeholder” governance and ICT liberalization norms toward an era characterized by aggressive techno-nationalism and state-centric control over networks, software applications, and expression. However, there were also…