21 to 30 of about 665
A new model for analyzing online threats could help investigators detect and disrupt malicious operations more quickly—and enable them to better share their insights and understanding with one another.
Spyware and digital forensics technologies are being used for political repression around the world. Democratic governments are some of the worst offenders.
Differing Kenyan and Ethiopian journalism norms have fundamentally shaped the strategies and local relationships of three Chinese firms contracted to build railways in Africa.
Japan’s startup ecosystem has arrived at a pivot point: for the first time, it is able to draw top-tier talent to high-growth startups at a scale that was not possible just 15 years ago.
In a year dominated by the rhetoric of defending democracy, EU democracy support policies were adjusted in important ways to align with the new geopolitical context. However, the union also seemed to treat commitments in this area as second-order priorities compared to security.
Washington has four options for multilateralism: a charter, a club, a concert, or a coalition model. The task is choosing the right approach for the right situation.
Major social media and technology companies continue to make algorithmic, user interface, and policy changes to their products to address information integrity challenges on their platforms.
Moscow’s fixation on regime security and the interaction between domestic and foreign policy has been continually highlighted across the past decades and currently continues apace.
Instead of fixating on infrastructure, African countries should look to the experience of Latin American countries with similar resource endowments: a greater relative abundance of land than low-cost labor.
Russia’s cyber operations in Ukraine have apparently not had much military impact. This was probably for a multitude of reasons: Russia’s offensive limitations, as well as the defensive efforts of Ukraine and its partners; the particular context of this war, as well as structural features of cyberspace and warfare generally.