by
Pukhraj Singh
—
published
Nov 15, 2019
—
last modified
Nov 18, 2019 10:14 AM
—
filed under:
Cybersecurity,
Norms Formulation
In a guest post in relation to CIS’s recently held roundtable onIndia’s cyber defense strategy, Pukhraj Singh looks at the critical fissures – at the technical and policy levels – in global normative efforts to secure cyberspace. By charting out the key vectors and power asymmetries among key stakeholders – both leading state actors and private actors like Microsoft – Singh posits that there is much to be done before we circumscribe cyber operations within legal strictures.
Located in
Internet Governance
/
Blog