Blog

When the code is everyone’s, who is responsible for its security? And do UN cyber norms have anything to say about it?

By |2026-04-03T16:11:50+02:00April 3rd, 2026|Blog|

Anastasiya Kazakova (Cyber Diplomacy Knowledge Fellow and Geneva Dialogue Project Coordinator, DiploFoundation).

Comments Off on When the code is everyone’s, who is responsible for its security? And do UN cyber norms have anything to say about it?

Quantum computing and cyber risks: Are we separating signal from noise?

By |2026-03-31T16:18:52+02:00March 31st, 2026|Blog|

By Serge Droz (Senior technical advisor, Swiss Federal Department of Foreign Affairs), in conversation with Anastasiya Kazakova (Cyber Diplomacy Knowledge Fellow and Geneva Dialogue Project Coordinator, DiploFoundation).

Comments Off on Quantum computing and cyber risks: Are we separating signal from noise?

Speed, scale, and blind spots: Stress-testing cyber stability in the age of AI

By |2026-03-23T16:39:03+01:00March 23rd, 2026|Blog|

By Donavan Cheah (Senior Cybersecurity Consultant, Thales), in conversation with Anastasiya Kazakova (Cyber Diplomacy Knowledge Fellow and Geneva Dialogue Project Coordinator, DiploFoundation).

Comments Off on Speed, scale, and blind spots: Stress-testing cyber stability in the age of AI

How Open Source Coordinates: A Guide for Policy Makers
Understanding horizontal governance in the FOSS ecosystem

By |2026-02-02T11:40:11+01:00January 28th, 2026|Blog|

Mirko Boehm, Senior Director for Community Development, Linux Foundation Europe

Free and open source software (FOSS) sustains global infrastructure but resists centralized control. Coordination occurs through dependencies, open governance, and self-organizing communities. These structures create opportunities for standards and innovation, yet limit direct policy influence. Effective engagement requires adapting to horizontal collaboration rather than imposing hierarchy.

Comments Off on How Open Source Coordinates: A Guide for Policy Makers
Understanding horizontal governance in the FOSS ecosystem

Bridging the gaps: Why NIS2 Is more than just compliance

By |2025-09-16T10:23:01+02:00September 10th, 2025|Blog|

Sofia Martinez Gomez, Cybersecurity Expert, AlixPartners

Earlier this year, Huawei organised the Cyber Security Forum at its Brussels-based Cyber Security Transparency Center, where I had the opportunity to explore the evolving landscape of cybersecurity regulation—specifically the NIS2 Directive—and share what it really means for organizations today.....

Comments Off on Bridging the gaps: Why NIS2 Is more than just compliance

Recalibration of international order: Growing sovereignty in a multipolar and multistakeholder cyberworld

By |2025-03-27T16:07:33+01:00March 27th, 2025|Blog|

Anastasiya Kazakova, Cyber Diplomacy Knowledge Fellow, DiploFoundation

In 2017 Richard Haass called for a new world order 2.0 that is based on ‘sovereign obligation’, the notion that sovereign states have not just rights, but also obligations to others....

Comments Off on Recalibration of international order: Growing sovereignty in a multipolar and multistakeholder cyberworld

Exploring the Challenges and Solutions of Data Protection in AI

By |2024-07-18T14:55:39+02:00July 18th, 2024|Blog|

Igor Kumagin, Cybersecurity expert, Kaspersky

The appearance of new technology in our lives requires the re-evaluation of some basic concepts that have been established for a long time...

Comments Off on Exploring the Challenges and Solutions of Data Protection in AI

Rules for the security of digital products: Who should write them?

By |2024-02-07T12:32:56+01:00February 7th, 2024|Blog|

Xiang Zheng Teo, Ensign InfoSecurity
Anastasiya Kazakova, DiploFoundation

As users of numerous digital products – apps, smart devices etc. – we expect a certain level of security and safety while using those products, although we don’t know how secure they are and, what’s more, don’t often have easily accessible ways to acquire such knowledge.

Comments Off on Rules for the security of digital products: Who should write them?
Go to Top