Today’s advances in fifth-generation telecommunications (5G) promise a transformational technology that is critical to enabling the next industrial revolution. 5G will provide massive benefits for future economic development and national competitiveness, including certain military applications. 5G is far more than simply a…
read moreEurope is at the center of a worldwide debate and conflict over the role of Chinese telecom giant Huawei in the emergence of 5G technology. Within Europe, Germany occupies the most significant decision-making focal point. Germany has Europe’s largest and most advanced…
read moreEn el sentido más académico, una copia de seguridad es un proceso mediante el cual se duplica la información existente de un soporte a otro, con el fin de poder recuperarlo en caso de fallo del primer alojamiento de los datos. Sin…
read moreHasta hace pocos años, la idea de interconectar dispositivos tecnológicos estaba ligada a la clásica distribución de una red de ordenadores cableada que nos permitía por un lado, tener acceso a un servidor, normalmente de datos y por otro, a Internet. No…
read moreDefense of the North Atlantic Treaty Organization (NATO) in cyberspace requires an understanding of the threats the alliance must face, knowing where it must act, and ensuring that the alliance has the capabilities and capacity available to successfully defend itself. Since the…
read moreThe United Kingdom aims to be a world-leader in harnessing the power of technology for the benefit of its citizens. Since the publication of the National Cyber Security Strategy in 2016, internet connectivity has continued to expand, devices have proliferated, and global…
read moreTelegram is currently considered the preferred digital communication tool for IS sympathizers. It serves as a stable online platform for pro-IS content, an ecosystem for building extremist networks, an effective and secure internal communications tool, and a forum for recruiting new IS…
read moreThe following guidance is designed to outline values, principles, and guidelines to assist department and delivery leads in ensuring that they develop and deploy AI ethically, safely, and responsibly. It is designed to complement and supplement the Data Ethics Framework. The Data…
read moreEn los siguientes epígrafes se desarrollan los aspectos más significativos de lo que ha constituido la base de los ciberincidentes ocurridos en 2018. La utilización de tecnología fabricada en otros Estados constituye una fuente de preocupación para los gobiernos de todo el…
read moreLos libros blancos tienen por objeto analizar en profundidad un asunto o una política para asesorar a las partes interesadas, a los órganos legislativos o a los Gobiernos. En materia de ciberseguridad, el Estado es el primer y principal garante de la…
read more