Cybersecurity

Sponsored
by

Cybersecurity / Featured Blogs

A Review of the 2024 Threat Landscape and Implications for Domain Security

The cybersecurity landscape in 2024 has been characterised by unprecedented complexity and rapidly evolving threats, presenting significant challenges for organisations across all sectors. As the digital attack surface expands and threat actors employ increasingly sophisticated techniques, domain security has emerged as a critical component of a robust cybersecurity strategy.

A Collision Between Tech Policy and Foreign Policy: the UN Cybercrime Convention

Sometime by year-end, the UN General Assembly (UNGA) will vote on the proposed UN Convention Against Cybercrime. The treaty is opposed by most civil liberties organizations and Internet businesses, although the US position appears uncertain, mostly for reasons of foreign policy.

Cybersecurity Standards Competition

The conventional wisdom in the world of legacy standards-making is that monolithic standards produce, if not accelerate, better products and services. Conformance, certification, and associated labelling schemes to implement those standards were believed essential to trust. Although competition law seems now evolving in the other direction, regulatory standards-making bodies themselves have been accorded considerable anticompetitive cartel liability protection.

UN Cyber Diplomacy II: Cybersecurity and Autonomous Weapon Systems

Cybersecurity and artificial intelligence were among the key topics at the 79th UN General Assembly (UNGA). UNGA's 1st Committee, responsible for disarmament and international security, concluded its negotiations in mid-November 2024. It discussed the 3rd Annual Progress Report (APR) of the Open-Ended Working Group (OEWG) and adopted a resolution that recommends, inter alia, the establishment of a new permanent cybersecurity mechanism within the UN system. Furthermore, it adopted two resolutions on autonomous weapon systems (AWS).

11 Information Economy Policy Reversals Coming to a Marketplace Near You!

In the wake of the election, sweeping policy shifts in the information economy are set to accelerate. Expect fast-tracked FCC reforms, Starlink subsidies, and AI-driven oversight to redefine media, tech, and regulatory landscapes. From relaxed antitrust to intensified media control, these eleven reversals signal a move toward deregulation and Chicago School libertarianism, with lasting impacts on U.S. markets and governance.

Enterprise Domain Stargazing: Understanding Your Company’s Galaxy of Domains

In CSC's recent insight paper, we address the trend that many business leaders today don't realize the extent to which their modern enterprise -- and its millions of digital assets -- rely on. It's a vast domain ecosystem that needs to be protected from online threats. Often, to better understand this need for domain security, we need to understand how critical and interconnected domains are within a business.

Project 2025: The Internet and Cybersecurity

As the saying goes, elections have consequences. The consequences are underscored in the recent U.S. Presidential election and the potential impact on the Internet, infrastructure and cybersecurity. In the context of the CircleID global community, it seems worth asking where things are headed? It does beg for an analysis of what is actually proposed in Presidential Transition Project 2025 related to things internet and cybersecurity.

How Dormant Domains Can Be Weaponized During Events Like the 2024 U.S. Election

As with any high-stakes event, elections have become a prime target for cybercriminals seeking to exploit public trust through impersonation, misinformation, and scams. CSC's comprehensive research about the 2024 U.S. Election reveals the alarming role of dormant domains, which have the potential to be exploited for launching cyber attacks against political campaigns, organizations, and constituents.

NIS2 Article 28 Guidance: A Positive Step Toward Reducing DNS Abuse Across Europe

The European Union (EU) has set a high bar by tackling domain name system (DNS) abuse head on via government regulation and seems to have successfully resisted attempts to water down DNS stewardship obligations. Recent guidance from a key European Commission cooperation group (the NIS Cooperation Group) handling sections of the Network and Information Security Directive (NIS2) intends for a robust implementation of Article 28, which will go a long way toward helping to mitigate some of the longstanding problems that persist in the DNS.

Has Your ISP Been Hacked? (Growing Concern Over AI-Driven Hacking)

As if we didn't have a long enough list of problems to worry about, Lumen researchers at its Black Lotus Labs recently released a blog that said that it knows of three U.S. ISPs and one in India was hacked this summer. Lumen said the hackers took advantage of flaws in software provided by Versa Networks being used to manage wide-area networks.