July 10, 2025
Posted by: Jessica Beyer
The European Union’s Artificial Intelligence Act operationalizes a risk-based governance logic that is now permeating international AI frameworks, although unevenly. While some of the Act’s tiered risk taxonomy remains largely
July 10, 2025
Posted by: Jessica Beyer
Since its independence in 1971, Bangladesh has steadily advanced technologically, achieving 99.4% electrification, connecting 44.5% of its population to the internet, expanding subsea cable infrastructure, and pursuing a vision of
July 9, 2025
Posted by: Jessica Beyer
The rapid proliferation of autonomous weapon systems (AWS) in warfare offers a glimpse into the transformative potential and the ethical dilemmas of AWS. For instance, during the ongoing conflict in
July 9, 2025
Posted by: Jessica Beyer
Subsea cables cover over 900,000 miles of sea floor from the Atlantic to Pacific. These small, fiber-optic cables are responsible for carrying 99% of global internet data traffic, facilitating connection
July 9, 2025
Posted by: Jessica Beyer
In 2016, the Democratic National Committee (DNC) headquarter in Washington DC, was a victim of Russian hacking attacks leading to a data dump of internal emails and leaks of critical
July 9, 2025
Posted by: Jessica Beyer
23andMe experienced a data breach that exposed over seven million of its customers’ genetic information in 2023 (DeGeurin, 2024). The data breach severely affected 23andMe’s reputation and caused 23andMe to
June 5, 2025
Posted by: Jessica Beyer
The Digital ‘Me’ For Sale: On Clearance The United States lacks any form of comprehensive federal policy to regulate data brokers, allowing these entities to collect, aggregate, and sell personal
May 20, 2025
Posted by: Jessica Beyer
Russia has a complex system of cybersecurity agencies and laws which help to explain Russia’s actions as a cyber actor. Russia’s Constitution states that Russians have the right to privacy
May 20, 2025
Posted by: Jessica Beyer
The OceanLotus group, also known as APT32, is an offensive cybersecurity organization that has been known to conduct cyber intrusion and espionage campaigns since 2013 (Carr 2017). One of its
May 8, 2025
Posted by: Jessica Beyer
Kenya is an emerging technological power with a strong foundation in domestic cybersecurity policies and enforcement mechanisms. While it is not a major cybersecurity actor on the global stage, it