{"id":2913,"date":"2013-04-17T17:27:05","date_gmt":"2013-04-17T17:27:05","guid":{"rendered":"http:\/\/prensa.lacnic.net\/news\/abril2013-en\/%e2%80%9ccybersecurity-knows-no-borders%e2%80%9d"},"modified":"2023-03-21T14:23:50","modified_gmt":"2023-03-21T14:23:50","slug":"cybersecurity-knows-no-borders","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/","title":{"rendered":"\u201cCybersecurity knows no borders\u201d"},"content":{"rendered":"<p><strong>Marco Obiso<\/strong>, International Telecommunication Union (ITU) Cybersecurity Coordinator, noted that the Internet was not designed to take into account security-related challenges, which is why enhancing international cooperation to face major challenges in this area is key.<\/p>\n<p>Obiso believes that the lack of national and international legislation conspires against effectively dealing with the most common computer security problems worldwide.<\/p>\n<p>In his interview with Lacnic News, Obiso remarked that, in order to continue to support the development of a stable Internet, an adequate balance must be achieved between security and privacy.<\/p>\n<p><strong>In your opinion, what are the most common security issues at global and regional level?<\/strong><\/p>\n<p>We need to overcome several problems. We don\u2019t have appropriate national and regional legal frameworks and applications to face major security challenges. We also lack secure software and appropriate national and global organizational structures.<\/p>\n<p>Human resources are another weakness, as we need more computer security professionals and skills at government level. In addition, users\u2019 lack of basic knowledge has also become another problem.<\/p>\n<p>Finally, because this is a global challenge, it is important to enhance international cooperation among industry experts, law enforcement agencies, regulators, academia, and international organizations.<\/p>\n<p><strong>Is it possible to quantify the losses caused by computer security incidents in Latin America?<\/strong><\/p>\n<p>At the moment no standardized data are available. Several security companies conduct their own analyses based on their products and sensors.<\/p>\n<p><strong>How important is collaboration between public and private, national and international stakeholders to mitigate computer security incidents in Latin America and the Caribbean?<\/strong><\/p>\n<p>This element is key. Cooperation must permeate every cybersecurity related activity, as it is by nature a multidimensional issue that knows no borders.<\/p>\n<p><strong>The Internet&#8217;s impact on people&#8217;s lives will continue to grow. What are the challenges for improving Internet security, while at the same time improving the exercise of individual rights online?<\/strong><\/p>\n<p>We have to strike the right balance between security and privacy. The Internet was not designed to take into account security-related challenges so, instead of coming up with a patch every time there is a problem, we should work more proactively in this area. In this sense, global cooperation is key.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Marco Obiso, International Telecommunication Union (ITU) Cybersecurity Coordinator, noted that the Internet was not designed to take into account security-related challenges, which is why enhancing international cooperation to face major challenges in this area is key. Obiso believes that the lack of national and international legislation conspires against effectively dealing with the most common computer [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499,503],"tags":[1271,1289],"archivo":[629,1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-2913","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-research","tag-cibersecurity","tag-research","archivo-april-2013-edition","archivo-editions"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | \u201cCybersecurity knows no borders\u201d<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | \u201cCybersecurity knows no borders\u201d\" \/>\n<meta property=\"og:description\" content=\"Marco Obiso, International Telecommunication Union (ITU) Cybersecurity Coordinator, noted that the Internet was not designed to take into account security-related challenges, which is why enhancing international cooperation to face major challenges in this area is key. Obiso believes that the lack of national and international legislation conspires against effectively dealing with the most common computer [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-17T17:27:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:23:50+00:00\" \/>\n<meta name=\"author\" content=\"LACNIC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/\"},\"author\":{\"name\":\"LACNIC\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\"},\"headline\":\"\u201cCybersecurity knows no borders\u201d\",\"datePublished\":\"2013-04-17T17:27:05+00:00\",\"dateModified\":\"2023-03-21T14:23:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/\"},\"wordCount\":360,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"keywords\":[\"Cibersecurity\",\"Research\"],\"articleSection\":[\"Cybersecurity\",\"Research\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/\",\"name\":\"LACNIC Blog | \u201cCybersecurity knows no borders\u201d\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"datePublished\":\"2013-04-17T17:27:05+00:00\",\"dateModified\":\"2023-03-21T14:23:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201cCybersecurity knows no borders\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\",\"name\":\"LACNIC\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | \u201cCybersecurity knows no borders\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | \u201cCybersecurity knows no borders\u201d","og_description":"Marco Obiso, International Telecommunication Union (ITU) Cybersecurity Coordinator, noted that the Internet was not designed to take into account security-related challenges, which is why enhancing international cooperation to face major challenges in this area is key. Obiso believes that the lack of national and international legislation conspires against effectively dealing with the most common computer [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2013-04-17T17:27:05+00:00","article_modified_time":"2023-03-21T14:23:50+00:00","author":"LACNIC","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/"},"author":{"name":"LACNIC","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9"},"headline":"\u201cCybersecurity knows no borders\u201d","datePublished":"2013-04-17T17:27:05+00:00","dateModified":"2023-03-21T14:23:50+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/"},"wordCount":360,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"keywords":["Cibersecurity","Research"],"articleSection":["Cybersecurity","Research"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/","url":"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/","name":"LACNIC Blog | \u201cCybersecurity knows no borders\u201d","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"datePublished":"2013-04-17T17:27:05+00:00","dateModified":"2023-03-21T14:23:50+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-knows-no-borders\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"\u201cCybersecurity knows no borders\u201d"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9","name":"LACNIC","url":"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":2910,"post_title":"\u201cLa seguridad cibern\u00e9tica no tiene fronteras\u201d","slug":"la-seguridad-cibernetica-no-tiene-fronteras","href":"https:\/\/blog.lacnic.net\/la-seguridad-cibernetica-no-tiene-fronteras\/"},{"locale":"pt_BR","id":2914,"post_title":"\u201cA seguran\u00e7a cibern\u00e9tica n\u00e3o tem fronteiras\u201d","slug":"a-seguranca-cibernetica-nao-tem-fronteiras","href":"https:\/\/blog.lacnic.net\/pt-br\/a-seguranca-cibernetica-nao-tem-fronteiras\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/2913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=2913"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/2913\/revisions"}],"predecessor-version":[{"id":20685,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/2913\/revisions\/20685"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=2913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=2913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=2913"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=2913"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=2913"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=2913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}