Drone Warfare Redefined: Ukraine’s Operation Spiderweb and the Future of War

Drone Warfare Redefined: Ukraine’s Operation Spiderweb and the Future of War

Operation Spiderweb marked a turning point in the war between Ukraine and Russia. Using dozens of small drones launched from inside Russian territory, Ukraine managed to strike deep into military air bases and damage key bombers. This post explores how the operation worked, why it caught Russia off guard, and what it reveals about the future of warfare in a connected world.

Read More
UN Open Source Week 2025, Part V. Recap: Trust, Sovereignty, and the Future of DPI

UN Open Source Week 2025, Part V. Recap: Trust, Sovereignty, and the Future of DPI

What did UN Open Source Week 2025 reveal about building digital infrastructure we can trust? In this final recap, we reflect on hackathons, open source governance, and DPI as a social contract, surfacing tensions and lessons ahead of the Global DPI Summit in Cape Town.

Read More
UN Open Source Week 2025. Part IV: Building DPI We Can Trust

UN Open Source Week 2025. Part IV: Building DPI We Can Trust

At UN Open Source Week 2025, the DPI side panel track showed how open source frameworks become trusted, inclusive infrastructure. From payment systems in Africa to civic tech in Barcelona and safeguards for rights. Here’s what it takes to build DPI that serves people.

Read More
UN Open Source Week 2025. Part II: OSPOs for Good, Institutional Shifts, and the Architecture of Trust

UN Open Source Week 2025. Part II: OSPOs for Good, Institutional Shifts, and the Architecture of Trust

OSPOs are moving from niche to necessary. Part II of our UN Open Source Week series covers how governments, nonprofits, and the private sector are building trust through open source: from interoperability to digital public infrastructure.

Read More
UN Open Source Week 2025: What to Expect at the Digital Frontier

UN Open Source Week 2025: What to Expect at the Digital Frontier

What does the future of digital infrastructure look like, and who gets to build it? From June 16 to 20, 2025, the UN will host its flagship Open Source Week in New York. This year’s agenda covers OSPOs, AI ethics, sovereign tech, and Digital Public Infrastructure (DPI), featuring speakers from governments, tech communities, and civil society. The Wireless Cable previews the full week, including a case study by our Editor-in-Chief on biometric risks in DPI.

Read More
The Most Devastating Confidentiality Breaches in History
101 Series, CIA Triad, Confidentiality Jorge Tuddon 101 Series, CIA Triad, Confidentiality Jorge Tuddon

The Most Devastating Confidentiality Breaches in History

What do a rogue sysadmin, a baby monitor, and a trove of leaked intelligence files have in common? They each reveal a different face of confidentiality failure. In this remastered post, we break down four types of breaches that continue to haunt businesses and governments alike; distilling lessons from real-world examples and showing why confidentiality still anchors cybersecurity today.

Read More
(101 Series: DPI) Safeguarding Digital Public Infrastructure: Protecting Public Trust in the Digital Age

(101 Series: DPI) Safeguarding Digital Public Infrastructure: Protecting Public Trust in the Digital Age

As governments digitize everything from ID systems to public services, a critical question looms: who protects the public from digital overreach? In this deep dive, we explore what DPI Safeguards are, why they matter, and how they can uphold trust, rights, and institutional integrity in the digital age.

Read More
The U.S. vs. Google (II): Between a Historic Ruling and the Risk of Regulatory Simulation

The U.S. vs. Google (II): Between a Historic Ruling and the Risk of Regulatory Simulation

A historic ruling against Google marks a turning point in U.S. tech regulation—but will it lead to real change or simply reinforce the illusion of accountability? In this follow-up to our original analysis, we break down what the court decided, how the DOJ responded, and what’s really at stake for the digital economy.

Read More
What to Expect in 2025: Cybersecurity, Geopolitics, and the Digital World
The year ahead Jorge Tuddon The year ahead Jorge Tuddon

What to Expect in 2025: Cybersecurity, Geopolitics, and the Digital World

As 2025 kicks off, the geopolitical and digital landscapes are already shifting. From regulatory battles over AI and cybersecurity to Musk and Trump’s growing influence in tech policy, this year promises to redefine global power structures. What’s next for cybersecurity threats, digital sovereignty, and platforms like TikTok? We break down the key trends shaping the year ahead.

Read More
Salt Typhoon: Unmasking a New Era of Cyber Espionage on Election Day
Analysis Jorge Tuddon Analysis Jorge Tuddon

Salt Typhoon: Unmasking a New Era of Cyber Espionage on Election Day

In an era where digital information flows freely, the emergence of cyber threats like Salt Typhoon presents significant challenges to national security and the integrity of democratic processes. This article delves into the activities of the Salt Typhoon group, exploring their methods, implications for U.S.-China relations, and the urgent need for robust cybersecurity measures to protect sensitive information from espionage.

Read More
(101 Series: Cybersecurity) Cybersecurity, a History: From Undefined Term to Critical Global Issue
101 Series Jorge Tuddon 101 Series Jorge Tuddon

(101 Series: Cybersecurity) Cybersecurity, a History: From Undefined Term to Critical Global Issue

As cybersecurity has evolved from a technical term to a cornerstone of global politics, its significance in international relations is undeniable. In this article, we explore the complex journey of cybersecurity, from its early origins to its growing role in shaping statecraft and international cooperation, highlighting how cyber threats are redefining power in the digital age.

Read More