In February 2022, CCG-NLUD will commence the latest edition of its Seminar Course on Technology and National Security Law and Policy (“the Seminar Course”). The Seminar Course is offered to interested 4th and 5th year students who are enrolled in the B.A. LL.B. (Hons.) programme at the National Law University, Delhi. The course is set […]
Related Posts
Technology and National Security Law Reflection Series Paper 5: Legality of Cyber Weapons Under International Law
The United Nations Ad-hoc Committee for Development of an International Cybercrime Convention: Overview and Key Observations from Week I of the Fifth Substantive Session.
CCG-NLUD’s Statement on International Cooperation to the Fifth Session of the Ad Hoc Committee to Elaborate a Comprehensive International Convention on Countering the Use of Information and Communication Technologies for Criminal Purposes
Understanding the Anatomy of Cyber Enabled Crimes and their Governance
The United Nations Ad-hoc Committee for Development of an International Cybercrime Convention: Overview and Key Observations from Fourth Substantive Session (Part II)
The United Nations Ad-hoc Committee for Development of an International Cybercrime Convention: Overview and Key Observations from Fourth Substantive Session
DPRK IT Workers | A Network of Active Front Companies and Their Links to China
US Cyber Trust Mark logo for smart devices is coming
The United Nations Ad-hoc Committee for Development of an International Cybercrime Convention: Overview and Key Observations from Week II of the Fifth Substantive Session
The United Nations Ad-hoc Committee for Development of an International Cybercrime Convention: Overview and Key Observations from First Substantive Session
S Ventures Invests in poolside, Next Generation AI for Software Engineering
LABScon24 Replay | The Ransomware Trust Paradox
LABScon24 Replay | Let Them Eat Cake: “Secure by Upgrade” Software is a National Security Threat
Cloud Malware | A Threat Hunter’s Guide to Analysis, Techniques and Delivery
China’s Influence Ops | Twisting Tales of Volt Typhoon at Home and Abroad
Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response
Wakaruyo – Browser Extension
US sanctions prominent Chinese cyber company for role in Flax Typhoon attacks
U.S. Sanctions Chinese Cybersecurity Firm for State-Backed Hacking Campaigns