
Surprise! National Security Controls on Drones are Harming National Security
Many government controls on the digital economy are justified by national security claims. Too often, these controls are motivated not by sound cybersecurity principles, but by an archaic economic nationalism. The prevailing idea in the U.S. Defense Department, for example,…
IGP to present at National Academies Workshop on Countering Disinformation
Disinformation online, and how it might be addressed, remains a persistent challenge for civil society, firms, and states. Tomorrow, April 10, the National Academies of Sciences will begin a workshop on Evolving Technological, Legal and Social Solutions to Counter Disinformation…
Get the Facts about the TikTok Law
We’d like to make the debate over a TikTok ban a bit more informative than it has been. Because the current law in the U.S. Congress is an unprecedented assertion of government control over a social media app, the stakes…
Feedly and Cyware: Rich context for faster analysis
Threat IntelligenceFeedly and Cyware: Rich context for faster analysisImprove analyst productivity and accelerate action.15-second summaryCyware’s CTIX and Orchestrate help teams analyze, collaborate, and orchestrate actions on threat intelligence data acquired from commercial and open sources. However, Cyware users need their…
Cybersecurity Data Governance Digital Trade Free Expression Online Geopolitics of IG Privacy & Surveillance
Yes, it’s a Ban – The Real Story Behind the New TikTok Law
The US Government is seeking new authorities to ban TikTok as a national security threat. If it sounds like deja vu, that’s because it is. In the year and three months since our study debunking the claims that TikTok is…
Outsmart the competition & extract actionable insights
Market IntelligenceOutsmart the competition & extract actionable insightsContinuously monitor competitors’ real-time moves & analyze their strategy with AI 15 sec-summaryNavigating a dynamic competitive landscape and staying ahead of the competition is tougher than ever. With so much information published across…
Unpacking India’s New AI Advisory
India’s government is intensifying its scrutiny of foreign tech companies ahead of national elections. A recent directive from India’s Ministry of Electronics and Information Technology (MeitY) mandates explicit government permission for deploying “under-tested” or “unreliable” AI models and software for…
TTP Dashboard: Discover trending threat actor behavior
Threat IntelligenceTTP Dashboard: Discover trending threat actor behaviorPrioritize threat hunts, prepare mitigations, and create threat actor profiles.15 Sec-summaryIdentifying new threat actor behavior is tedious and resource-intensive, requiring focused reading to tag text in articles to MITRE ATT&CK and manually extract…
Public and Private Power in Internet Content Regulation: ICANN and Registry “Voluntary” Commitments
Is censorship something that only happens when state actors do it, or can private actors engage in it as well? That crucial Internet governance debate is taking place in two venues: The U.S. Supreme Court, which will rule on two…
The Dutch in the grip of Internet nationalism
The Netherlands has a reputation for being a liberal, broad-minded place that is open to the world. Its scholars in Internet governance have emphasized the need for a globally recognized “public core” of the Internet. But apparently the virus of…