Tag Archives: Cyber war;

Why are internet security standards badly deployed and what to do about it?

In 2019 under the aegis of the Internet Governance Forum a pilot project was conducted into the causes of and solutions for the, in general, slow deployment of internet security standards. Standards that on mass deployment make the internet and … Continue reading

Posted in Cyber security, Internet governance, Internet standards; | Tagged , , , , , , , , , | Leave a comment

How the West was won or protecting data

The Internet world shook once again this week with the revelation of military, strategic information leaked by a sports app. By running around the compound soldiers gave away their position to the app, that dutifully offered this information to the … Continue reading

Posted in Cyber awareness, Cyber education, Cyber espionage, Cyber security, Cyber warfare, Privacy | Tagged , , , | Leave a comment

Breaking down silos, or cooperation in all things cyber

“We need to break down silos”, is a phrase often heard in national and international meetings around cyber security and enforcing cyber crime. So it is no coincidence that at the upcoming NLIGF (Netherlands Internet Governance Forum), the IGF, but … Continue reading

Posted in Botnets, Cyber crime, Cyber security, Hacking, International cooperation: cross border aspects, Internet governance, Privacy, spam | Tagged , , , , , , , , , , , | Leave a comment

Fear of China and ICT production, part 2

Recently I wrote a blog post on the lessons behind the takedown by Microsoft of 3322.org. BTW, this organisation is back online after striking a deal with Microsoft. (Click here.) In the blog I focussed on the fact that most … Continue reading

Posted in Cyber awareness, Cyber espionage, Cyber security, Cyber warfare, Hacking, Internet governance | Tagged , , , , , | Leave a comment

The Internet and the legitimacy of governments

In two recent debate events I participated in, on iFreedom and privacy in the online world, mistrust of government and government’s intentions and motivations on and towards the Internet were abundantly present with more than just a few people in … Continue reading

Posted in Cyber awareness, Cyber crime, Cyber espionage, Cyber security, Cyber warfare, International cooperation: cross border aspects, Internet governance, Privacy | Tagged , , , , , , , , , , | Leave a comment

Cyber security, BYOD and production in China

On one of my very first trips abroad as international liaison at OPTA I came back on the high-speed train from Paris after contributing for three days at the OECD on the anti-spam tool kit. Next to me was a … Continue reading

Posted in Botnets, Cyber awareness, Cyber crime, Cyber education, Cyber espionage, Cyber security, Mobile, Privacy | Tagged , , , , , , , , | Leave a comment

Coordination and cooperation in online threats

In his recent blog post Jan Jaap Oerlemans of Leiden University’s Law school reacted in-depth on the recent cyber security analyses of the Dutch National Cyber Security Centre and the accompanying letter of minister I. Opstelten of Security and Justice. … Continue reading

Posted in Cyber awareness, Cyber crime, Cyber espionage, Cyber security, Cyber warfare, Malware enforcement, Spam enforcement | Tagged , , , , , , , , , , , , | Leave a comment