<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-03-31T21:29:00+00:00</dc:date>

	
	<item>
		<title> The Operationalization of Norms and Principles on Cybersecurity (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20190916_the_operationalization_of_norms_and_principles_on_cybersecurity</guid>
		<link>https://circleid.com/posts20190916_the_operationalization_of_norms_and_principles_on_cybersecurity</link>
		<description><![CDATA[With two simultaneous processes getting underway in the UN General Assembly's First Committee, the UN Group of Governmental Experts (GGE) and the Open-Ended Working Group (OEWG) on Cybersecurity, and several technology and multi-stakeholder initiatives pushing cybersecurity improvement, the world of cyber norms has become both more interesting and more complicated. <a href="https://circleid.com/posts20190916_the_operationalization_of_norms_and_principles_on_cybersecurity">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Taking a Multi-Stakeholder Look at Cyber Norms (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20180827_taking_a_multi_stakeholder_look_at_cyber_norms</guid>
		<link>https://circleid.com/posts20180827_taking_a_multi_stakeholder_look_at_cyber_norms</link>
		<description><![CDATA[Recently we've seen several examples of likely state sponsored security incidents of which the appropriateness was later strongly debated. Incidents such as states impacting commercial enterprises during cyber attacks; purported sabotage of critical infrastructure, and attacks on civilian activists have all, to a greater or lesser degree, led to concerns being raised by both civilian watchdog groups, academics, technologists and governments. <a href="https://circleid.com/posts20180827_taking_a_multi_stakeholder_look_at_cyber_norms">More...</a>]]></description>
		<dc:date>2026-03-31T14:29:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>