Skip to main content

Cybersecurity Policy Blog

We share government affairs stories, discuss policy-making in cybersecurity and show how Kaspersky provides protection without borders

Cybersecurity resilience depends on cooperation among many stakeholders in the region, and in turn, that cooperation relies on transparency...
Read More 
How to further improve the Proposal of the EU Cyber Resilience Act
Read More 
A matter of trust: how to live in harmony with your software suppliers
Read More 
European Cyberpolicy Forum: The whole is more than the sum of its parts: sharing and multiplying cyber threat intelligence
Read More 
The EU’s upcoming Cyber Resilience Act should set new rules for the game
Read More 
Can labels help improve the cybersecurity of consumer software?
Read More 
A multipronged approach to protect ICT supply chains from cyberattacks
Read More 
New regular cyber-dialogue at the UN: mapping our expectations with reality
Read More 
Governments and enterprises across the Asia-Pacific region have been shoring up their cyber defenses amid the recent spate of cyberattacks.
Read More 
2021: A year in cyber diplomacy
Read More 
One click to attack critical infrastructure. What can we do? Reflections from the UN IGF Workshop
Read More 
Updated Approaches to Tackling Existing Problems of Cybersecurity During a Pandemic
Read More 
Cybersecurity awareness and training with a difference: EU Cyberpolicy Forum under the banner of KIPS
Read More 
Straight talk at the EU Cyberpolicy Forum: ‘We urgently need better international cooperation with all stakeholders in the ecosystem to...
Read More 
APAC Online Policy Forum III on the Greater Cyber-resilience through Cyber Capacity Building
Read More 
The recent cyberattack incidents involving the largest pipeline system for refined oil products and one of the world’s biggest meat...
Read More 
‘Cybersecurity is not everything. But without cybersecurity, everything is nothing’. This pun is not from me (unfortunately, I don't know...
Read More 
In cyberspace, it is well-known that once a vulnerability is being exploited, many of us will hardly be immune to the risks due to the...
Read More