Tuesday, March 21, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • USENIX Security '22 - Agnieszka Dutkowska-Zuk, Austin Hounsel, Amy Morrill, Andre Xiong, Marshini Chetty, Nick Feamster - ‘How and Why People Use Virtual Private Networks’
  • Software supply chain security practices are maturing — but it's a work in progress
  • Automate your DevSecOps to take the pressure off triage
  • Investing in People Doesn’t Take AI
  • Women's History Month at RiskLens: More Voices
Careers Security Awareness Security Bloggers Network 

Home » Cybersecurity » Careers » The Digital Deciders and The Future of Internet

SBN

The Digital Deciders and The Future of Internet

by Anastasios Arampatzis on December 2, 2018

Recently, the nonpartisan think tank New America published a report called “The Digital Deciders” or “how a group of often overlooked countries could hold the keys to the future of the global Internet.” The authors of the report are Robert Morgus, Jocelyn Woolbright and Justin Sherman.

The purpose of this thorough and comprehensive report is to survey how nations around the world approach internet governance and is a seminal guide for designing international cyber strategies and shaping diplomatic conversations. It includes a data visualization tool through which you can create your own rankings showing how countries view/behave toward the Internet.

Questioned about the report, Justin Sherman, Cybersecurity Policy Fellow at New America and co-author of the report, noted via email:

Using data points from social media use to internet penetration to assorted freedom indexes, we studied nation-states around the world and organized them into three groups: global and open, sovereign and closed and the ‘digital deciders.’ The first group of countries, global and open, is comprised of the likes of Canada, Australia, the United Kingdom and the United States, while the second group, sovereign and controlled, is comprised of the likes of the UAE, Turkey, Qatar, China, Russia and Iran. These countries have already taken decisive actions one way or the other, whether throttling traffic from foreign news sites or defending free speech on the internet. It’s the third group, the ‘digital deciders,’ who have yet to make key decisions about things like internet censorship, net neutrality and online surveillance—and may therefore hold important sway over the future of the global network. Brazil, Mexico and Indonesia are just some of the often-overlooked countries in this group.”

Is the “global and open” internet free?

Reading the report, one question came into my mind: is the Internet really free (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Anastasios Arampatzis. Read the original post at: https://www.tripwire.com/state-of-security/security-awareness/digital-deciders-future-of-internet/

December 2, 2018December 2, 2018 Anastasios Arampatzis Digital Deciders, Internet, Privacy, security, Security Awareness
  • ← What Type of Vulnerabilities Does a Penetration Test Look For?
  • Massive Marriott Data Breach, Secure Holiday Shopping Tips, Phishing Sites Using HTTPS – WB45 →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows
TSTV Podcast

Subscribe to our Newsletters

Most Read on the Boulevard

Scams Lost US $10 BILLION in 2022 — Crypto Fraud Grows Fast
Ethics in AI: The Missing Code
FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
Will Consumers Punish Vendors That Suffer a Data Breach?
How to Protect Your Company in a ChatGPT World
Detecting CVE-2023-23397: How to Identify Exploitation of the Latest Microsoft Outlook Vulnerability
FBI issues warning over crypto schemes; Mental health app data breach affects more than three million
SafeBreach Coverage for US-CERT Alert (AA23-074A) – Telerik Vulnerability in IIS Server
The Week in Security: YoroTrooper steals credentials in Europe, AI-created videos spread malware
Botnet Protection

Upcoming Webinars

Apr 04

Key Strategies for a Secure and Productive Hybrid Workforce

April 4 @ 1:00 pm - 2:00 pm
Apr 05

Securing Kubernetes With SentinelOne and AWS

April 5 @ 1:00 pm - 2:00 pm
Apr 05

From Vulnerable to Invincible: The Five-Step Journey to Complete Cloud Security

April 5 @ 3:00 pm - 4:00 pm
Apr 12

The State of Cloud-Native Security 2023

April 12 @ 1:00 pm - 2:00 pm
Apr 13

Case Study: Improving Code Security With Continuous Software Modernization

April 13 @ 11:00 am - 12:00 pm
Apr 24

Securing Open Source

April 24 @ 1:00 pm - 2:00 pm
May 03

https://webinars.securityboulevard.com/ciso-panel-tips-for-optimizing-cloud-native-security-stack-in-2023?utm_campaign=2023.05.03_Aqua_Webinar_SB&utm_source=BMRegister

May 3 @ 3:00 pm - 4:00 pm
May 22

Ransomware

May 22 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Industry Spotlight

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
Analytics & Intelligence API Security Application Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?

March 17, 2023 Richi Jennings | 3 days ago 0
White House to Regulate Cloud Security: Good Luck With That
Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

White House to Regulate Cloud Security: Good Luck With That

March 13, 2023 Richi Jennings | Mar 13 0
‘Extraordinary, Egregious’ Data Breach at House and Senate
Analytics & Intelligence API Security Application Security CISO Suite Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Extraordinary, Egregious’ Data Breach at House and Senate

March 10, 2023 Richi Jennings | Mar 10 0

Top Stories

Scams Lost US $10 BILLION in 2022 — Crypto Fraud Grows Fast
Analytics & Intelligence Application Security Blockchain Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Digital Currency Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Malware Mobile Security Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Social Engineering Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Scams Lost US $10 BILLION in 2022 — Crypto Fraud Grows Fast

March 16, 2023 Richi Jennings | 4 days ago 0
Dell Adds CrowdStrike to Cybersecurity Services Portfolio
Cloud Security Cybersecurity Featured Incident Response Network Security News Security Boulevard (Original) Spotlight Threat Intelligence 

Dell Adds CrowdStrike to Cybersecurity Services Portfolio

March 15, 2023 Michael Vizard | Mar 15 0
Palo Alto Networks Uses Machine Learning to Reduce SASE Costs
Cybersecurity Endpoint Featured Identity & Access Network Security News Security Boulevard (Original) Spotlight 

Palo Alto Networks Uses Machine Learning to Reduce SASE Costs

March 15, 2023 Michael Vizard | Mar 15 0

Security Humor

Robert M. Lee's & Jeff Haas' Little Bobby Comic - 'WEEK 422’

Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 422’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.