This article intends to clarify the role of trade controls in relation to dual-use research, stimulate the debate on the possible contribution of trade controls to the broader governance of sensitive research, and inspire ways to achieve this in practice. First, the article discusses the different interpretations of the term dual-use research by highlighting its relevance in the context of for export controlled research activities. Second, the article explores why there is a nexus between trade controls and research. In this regard, the added value and known shortcomings
connected to trade control implementation is presented.
Previous research has shown that developers rely on public platforms and repositories to produce functional but insecure code. We looked into the matter for ransomware, enquiring whether also ransomware engineers re-use the work of others and produce insecure code.
The use of outer space plays a vital role in both defense and civil fields. Since the separation of space activities between civil and defense applications is extremely inefficient, the Dual-Use concept has been considered fundamental for promoting the effective use of space. To the best of the authors' knowledge, most previous studies on Dual-Use focused on the technological aspects, and very few on a system engineering approach to Dual-Use. This left some important issues untouched such as the operational aspects of a system of systems, which need to be understood in a more generic context.
Technology is a key factor in, and often catalyst for, arms control. The increasingly rapid pace of technological change with respect to weapons systems and military capabilities, as well as of developments of inherently dual-use technologies (with both peaceful and military applications), present clear challenges to the law of arms control, both in terms of the application and/or potential modification of existing instruments, as well as the prospects for new regulation where necessary. Not only are military technologies, or technologies with a potential military dimension, developing rapidly, but the increasing diffusion of such technologies to more and more states and possibly to non-state actors further complicates the situation.
we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security. Specifically, we firstly introduce basic concepts and define dynamic defense in cyber security. Next, we review the architectures, enabling techniques and methods for moving target defense and mimic defense. This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense. Finally, we discuss some open challenges and opportunities for dynamic defense in cyber security.
With the progress of technologies for telecommunication, synthetic biology, chemistry, additive manufacturing and nanoscale processes, many opportunities arise, allowing more effective and innovative production and the achievement of results with great potential both on the technical and commercial sides. At the same time however, rapid technological developments may create opportunities and vulnerabilities that can be exploited for illicit procurement activities seeking sensitive items for proliferation programmes. The strategic trade control framework should evolve with the same pace. Enforcement and traceability of intangible technology transfer controls may become much more challenging, while at the same time improved approaches to internal compliance must be developed by suppliers and technology holders.
The Introduction first clarifies this new wave of technological innovation to explore the implications for human–machine relations, especially in the security sector, emphasising the characteristics of these emerging technologies and the main ethical and legal concerns, as well as their definitional challenges. Finally, it provides a comprehensive view of the distinctive European Union policy-making process and its impact on the governance of emerging security technologies.
This research article undertakes a comprehensive examination of the prevailing cybersecurity risks, while also delving into the transformative potential of AI in ameliorating these perilous hazards. Through a meticulous review of extant literature and insightful case studies, the article meticulously delineates emergent cyber threats, elucidating the manifold applications of AI in the realms of threat detection, prevention, and incident response.Furthermore, this research endeavor meticulously elucidates the intricate nexus of challenges and limitations inherent within AI-powered cybersecurity systems, encompassing ethical quandaries and technical impediments. By delineating these complexities, the article endeavors to foster a nuanced understanding of the intricate interplay between AI and cybersecurity.
This is the eleventh edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape.
Seven prime cybersecurity threats were identified in 2024