Xi Jinping's crackdown on private tech companies in China has shattered hopes of Beijing being a 'responsible stakeholder' in a U.S.-led world order. American CEOs are also silent on how their tech products are used in China, especially artificial intelligence. The Federal Government should engage with these CEOs to moderate the proliferation of sensitive technology and prioritise national security.
- Central Asia
- East Asia
- South Asia
- South East Asia
- West Asia
- Global Commons
- Book Reviews
- Conference Reports
- GH in the Media
- GH Wiki
- Maps and Infographics
- Partner Publication
- Podcasts and Videos
- Research Papers
- Research Reports
The recent Quad Leaders' Summit set cybersecurity cooperation as a priority for the four countries. The Quad leaders also announced the creation of a Senior Cyber Group, a joint effort on establishing cyber standards and security. This builds on an already-robust collaboration, especially since Quad members have shared cyber threat perceptions.
Public digital infrastructure encourages competition, innovation and inclusion. Through India Stack and Modular Open Source Identity Platform (MOSIP), the Indian experience offers developing countries a path to leapfrog the development phase for digital platforms. Open-source systems offer countries an opportunity to establish low-cost public identity, financial and data exchange systems. This policy brief explains how the G20's support of such platforms will accelerate adoption, allowing developing countries to advance digital usage.
In an interview with Garrison Moratto of The New Diplomatist, Amb. Rajiv Bhatia, Distinguished Fellow, Foreign Policy Studies, counters China's claims that the Quad is an "Asian NATO." He highlights how the India-U.S.-Japan-Australia Quadrilateral initiative aims to increase cooperation in the Indo-Pacific on international law and security. This podcast delves into the history of the Quad's formation, current strategic characteristics, and future geopolitics, ahead of the fall in-person Leaders' Summit in the U.S.
Sanctions are an important foreign policy tool, used especially by the West against its adversaries. Now, these rivals are retaliating with counter-sanctions. Are these effective? How does this impact global politics? Where does India stand in this free-for-all sanctions era?
On 30 July 2021, Lisa Curtis and Surjit Bhalla, co-chairs of the Gateway House Quad Economy and Technology Task Force, spoke to CNBC-TV-18 on the various channels of cooperation between the Quad countries in technology, supply chains and undersea cables, and the need to counter China's dominance in the Indo-Pacific.
UK-Pune based QiO Technologies is an industrial software analytics company that focuses on digital transformation. QiO differentiated itself by complying with and certifying its products with European GDPR standards, creating trust and a wider client-base. It offers a unique subscription plan based on investment returns, making it an attractive option for manufacturing MSMEs.
A ransomware attack recently targeted Kaseya, a software services company in the U.S., for $70 million, incapacitating hundreds of its clients globally. There is an increasing incidence of such attacks, with perpetrators targeting government agencies and high-tech companies, leading to considerable economic losses. How can governments mitigate these threats and attribute responsibility to those accountable?
For years, Western countries have used sanctions as a means of economic warfare against their adversaries. Now, China and Russia are utilising the same tactic against the West. The United Nations Security Council is paralysed by differences between the five permanent members, leaving the tools of unilateral sanctions and counter-sanctions to proliferate at the cost of UN-approved multilateral sanctions.
India and Taiwan face a common cyber threat from China – an extension of their respective territorial disputes with Beijing. This makes it essential for New Delhi and Taipei to initiate informal cybersecurity cooperation. They can begin by focusing on cyberattack attribution, critical infrastructure protection and cyber hygiene.