UN Open Source Week 2025, Part V. Recap: Trust, Sovereignty, and the Future of DPI

UN Open Source Week 2025, Part V. Recap: Trust, Sovereignty, and the Future of DPI

What did UN Open Source Week 2025 reveal about building digital infrastructure we can trust? In this final recap, we reflect on hackathons, open source governance, and DPI as a social contract, surfacing tensions and lessons ahead of the Global DPI Summit in Cape Town.

Read More
UN Open Source Week 2025. Part IV: Building DPI We Can Trust

UN Open Source Week 2025. Part IV: Building DPI We Can Trust

At UN Open Source Week 2025, the DPI side panel track showed how open source frameworks become trusted, inclusive infrastructure. From payment systems in Africa to civic tech in Barcelona and safeguards for rights. Here’s what it takes to build DPI that serves people.

Read More
UN Open Source Week 2025. Part II: OSPOs for Good, Institutional Shifts, and the Architecture of Trust

UN Open Source Week 2025. Part II: OSPOs for Good, Institutional Shifts, and the Architecture of Trust

OSPOs are moving from niche to necessary. Part II of our UN Open Source Week series covers how governments, nonprofits, and the private sector are building trust through open source: from interoperability to digital public infrastructure.

Read More
UN Open Source Week 2025: What to Expect at the Digital Frontier

UN Open Source Week 2025: What to Expect at the Digital Frontier

What does the future of digital infrastructure look like, and who gets to build it? From June 16 to 20, 2025, the UN will host its flagship Open Source Week in New York. This year’s agenda covers OSPOs, AI ethics, sovereign tech, and Digital Public Infrastructure (DPI), featuring speakers from governments, tech communities, and civil society. The Wireless Cable previews the full week, including a case study by our Editor-in-Chief on biometric risks in DPI.

Read More
The Most Devastating Confidentiality Breaches in History
101 Series, CIA Triad, Confidentiality Jorge Tuddon 101 Series, CIA Triad, Confidentiality Jorge Tuddon

The Most Devastating Confidentiality Breaches in History

What do a rogue sysadmin, a baby monitor, and a trove of leaked intelligence files have in common? They each reveal a different face of confidentiality failure. In this remastered post, we break down four types of breaches that continue to haunt businesses and governments alike; distilling lessons from real-world examples and showing why confidentiality still anchors cybersecurity today.

Read More
Safeguarding Digital Public Infrastructure: Protecting Public Trust in the Digital Age

Safeguarding Digital Public Infrastructure: Protecting Public Trust in the Digital Age

As governments digitize everything from ID systems to public services, a critical question looms: who protects the public from digital overreach? In this deep dive, we explore what DPI Safeguards are, why they matter, and how they can uphold trust, rights, and institutional integrity in the digital age.

Read More
The U.S. vs. Google (II): Between a Historic Ruling and the Risk of Regulatory Simulation

The U.S. vs. Google (II): Between a Historic Ruling and the Risk of Regulatory Simulation

A historic ruling against Google marks a turning point in U.S. tech regulation—but will it lead to real change or simply reinforce the illusion of accountability? In this follow-up to our original analysis, we break down what the court decided, how the DOJ responded, and what’s really at stake for the digital economy.

Read More
What to Expect in 2025: Cybersecurity, Geopolitics, and the Digital World
The year ahead Jorge Tuddon The year ahead Jorge Tuddon

What to Expect in 2025: Cybersecurity, Geopolitics, and the Digital World

As 2025 kicks off, the geopolitical and digital landscapes are already shifting. From regulatory battles over AI and cybersecurity to Musk and Trump’s growing influence in tech policy, this year promises to redefine global power structures. What’s next for cybersecurity threats, digital sovereignty, and platforms like TikTok? We break down the key trends shaping the year ahead.

Read More
Salt Typhoon: Unmasking a New Era of Cyber Espionage on Election Day
Analysis Jorge Tuddon Analysis Jorge Tuddon

Salt Typhoon: Unmasking a New Era of Cyber Espionage on Election Day

In an era where digital information flows freely, the emergence of cyber threats like Salt Typhoon presents significant challenges to national security and the integrity of democratic processes. This article delves into the activities of the Salt Typhoon group, exploring their methods, implications for U.S.-China relations, and the urgent need for robust cybersecurity measures to protect sensitive information from espionage.

Read More
(101 Series) Cybersecurity, a History: From Undefined Term to Critical Global Issue
101 Series Jorge Tuddon 101 Series Jorge Tuddon

(101 Series) Cybersecurity, a History: From Undefined Term to Critical Global Issue

As cybersecurity has evolved from a technical term to a cornerstone of global politics, its significance in international relations is undeniable. In this article, we explore the complex journey of cybersecurity, from its early origins to its growing role in shaping statecraft and international cooperation, highlighting how cyber threats are redefining power in the digital age.

Read More
The U.S. Supreme Court and Social Media (Part II)
Analysis Jorge Tuddon Analysis Jorge Tuddon

The U.S. Supreme Court and Social Media (Part II)

This is the second article in a series analyzing the evolving legal landscape around social media regulation in the U.S. Supreme Court. Building on earlier court rulings from Florida and Texas, the article explores SCOTUS' recent decisions and their implications for content moderation, the First Amendment, and the future of digital free speech.

Read More
Cyber Sabotage and Geopolitical Escalation: The Implications of Israel’s Alleged Role in Lebanon’s Pager and Walkie-Talkie Explosions
Analysis Jorge Tuddon Analysis Jorge Tuddon

Cyber Sabotage and Geopolitical Escalation: The Implications of Israel’s Alleged Role in Lebanon’s Pager and Walkie-Talkie Explosions

The recent pager and walkie-talkie explosions in Lebanon highlight the evolving nature of cyber-physical warfare, where even low-tech devices are weaponized through sophisticated supply chain sabotage. As Israel is suspected of orchestrating this attack, the incident reveals how cybersecurity vulnerabilities in global supply chains are increasingly blurring the lines between digital sabotage and kinetic warfare, with far-reaching geopolitical consequences.

Read More