• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Uncategorized  /  The need for international agreements on cybersecurity
11 March 2019

The need for international agreements on cybersecurity

Written by Seqrite
Seqrite
Uncategorized
  • 4
    Shares
Estimated reading time: 3 minutes

Over the last decade or so, it has become increasingly obvious that cybersecurity is no longer just a local issue. As the world has leaped into a digital era with communication in the blink of an eye and the click of a mouse, cybersecurity has gone beyond borders. It is now a truly global phenomenon and often used as a tool of warfare by entire nations, whether it is influencing elections in an enemy state, infiltrating power grids or maintaining entire cyber armies. The term “cyber warfare” has become even more pronounced and countries have woken up to the need to maintain international agreements to combat this growing scourge.

In many ways, cybersecurity agreements and alliances work in many ways to the cooperation treaties which different nations sign between themselves. In a pact touted as the first of its kind in 2013, the United States and Russia signed an agreement promising to work together against cyber threats. Later in 2015, cybersecurity also played an important part in a US agreement with China where both nations agreed not to “conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.”

These are just a few examples and the politics of cybersecurity agreements are a completely different topic which has its own repercussions. However, with more and more nations trying to cooperate with each other on this thorny topic, it is an important reminder of how no nation can single-handedly take on this battle.

The lack of an international regulator

Unlike other criminals, cyber criminals do not act in full view – they are shadowy characters and most of the times, it’s not even clear who the perpetrators are. The lack of an international cybersecurity regulatory body is actually a huge emboldening factor since most countries still look at cybersecurity as a national problem, rather than an international one. Unfortunately, cyber crime occurs across borders and without any international agreements, this is bound to continue

A lack of information sharing

While enterprises are beginning to understand that many cyber attacks can often be prevented by proper monitoring and trends analysis, this is a trend which nations are still slow to wake up to. Part of the reason is nations may often be suspicious of sharing information, especially if it is confidential, to other nations, even allies. However, in many cases, such information sharing could be critical to prevent attacks like WannaCry or NoPetya which spread across multiple countries and multiple states in a short period of time.

More cooperation

When it comes to the world, there seems to be more disagreement rather than agreement when it comes to cybersecurity. Nations keep on flicking accusations at each other over cyber warfare – the US continues to regard China, Russia and Iran with suspicion with the feelings mutually reciprocated. Nations who are opposed to each other often use the cyber platforms as a proxy war to inflict damage on each other.

That is why international agreements are the need of the hour. Some kind of consensus would lead to a spirit of cooperation and might lead to better and safer understanding about the cybersecurity problems the world at a large faces.

Saving the world from disaster

This may seem like scare-mongering but the likelihood of it is always present. The number of cybersecurity incidents is only increasing and their repercussions are only growing. It only takes a small spark – say, a cyber attack on a military base or an attack on a town’s municipal facilities – for repercussions to migrate from a digital world to reality. The last thing the world needs is prolonged military conflict but unless there are more agreements between nations about bolstering their respective cybersecurity defenses, the prospect always remains in the air.

As an IT security partner for your business, Seqrite provides comprehensive security from advanced cyber threats. To know more

 Previous PostCyberSecurity First Responders: Who are they and why enterprises ...
Next Post  Cybersecurity for the hospitality sector: What you need to know
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Gorgon APT fractures India’s Industrial Backbone

    Gorgon APT targeting MSME sector in India

    August 10, 2020
  • Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

    May 21, 2020
  • The-need-for-businesses-to-empower-the-CISO

    Why do boards need to empower their CISO?

    October 22, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.