World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

Congress Should Preempt State AI Safety Legislation
POLICY & GOVERNANCE
June 19, 2024

Congress Should Preempt State AI Safety Legislation

Regulation of AI models themselves should be done on the federal, not state, level. As…

0 Shares
Owner June 19, 2024
Auto Draft
POLICY & GOVERNANCE
June 17, 2024

Sanctions for Spyware

Sanctions could prove an effective tool in the fight against spyware abuses. Spyware is a…

0 Shares
Owner June 17, 2024
Auto Draft
STRATEGY & THREATS
June 12, 2024

Cyber Conflict and Subversion in the Russia-Ukraine War

Cyber operations reveal their limitations as means of warfare, but territorial conquest opens unique opportunities…

0 Shares
Owner June 12, 2024
Content Moderation and the Least Cost Avoider
INDUSTRY & COMMERCE
June 10, 2024

Content Moderation and the Least Cost Avoider

A useful lesson from the economic concept of the “least cost avoider,” suggests that significant…

0 Shares
Owner June 10, 2024
AI Safety Laws Are Not (Necessarily) a First Amendment Problem
POLICY & GOVERNANCE
June 9, 2024

AI Safety Laws Are Not (Necessarily) a First Amendment Problem

Whatever their policy merits, safety limitations on AI development generally do not raise First Amendment…

0 Shares
Owner June 9, 2024
The U.S. and China Need an AI Incidents Hotline
POLICY & GOVERNANCE
June 6, 2024

The U.S. and China Need an AI Incidents Hotline

Ironically, the two countries can look to the past, not the future, for inspiration on…

0 Shares
Owner June 6, 2024
Cyber, MacGyver, and the Limits of Covert Power
EDUCATION & RESEARCH
June 6, 2024

Cyber, MacGyver, and the Limits of Covert Power

A review of Lennart Maschmeyer, “Subversion: From Covert Operations to Cyber Conflict” (Oxford University Press,…

0 Shares
Owner June 6, 2024
As Allies, Kenya & US Aim to Bolster Digital Security in Africa
POLICY & GOVERNANCE
June 4, 2024

As Allies, Kenya & US Aim to Bolster Digital Security in Africa

Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect…

0 Shares
Owner June 4, 2024
Resilience Isn’t Enough, NATO Must Be ‘Proactive’ for Cyberdefense, Warns Official
STRATEGY & THREATS
June 4, 2024

Resilience Isn’t Enough, NATO Must Be ‘Proactive’ for Cyberdefense, Warns Official

NATO allies need to allow their militaries to be proactive in cyberspace to ensure the…

0 Shares
Owner June 4, 2024
Menace Unleashed: Excel File Deploys Cobalt Strike at Ukraine
STRATEGY & THREATS
June 4, 2024

Menace Unleashed: Excel File Deploys Cobalt Strike at Ukraine

Affected Platforms: Microsoft Windows Impacted Users: Microsoft Windows Impact: Compromised machines are under the control of the threat…

0 Shares
Owner June 4, 2024
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT