Cybersecurity is often framed as a technical challenge. But the results depend not only on technology, but on the strategic approach behind it.
Some governments approach cybersecurity as a matter of compliance, building defensive lines made of regulations, certifications, and reporting obligations. Others treat it as a technological contest where speed of innovation, control over intellectual property, and industrial capabilities determine who holds the advantage.
The recently released President Trump’s Cyber Strategy for America clearly places its bet on the second model. Rather than expanding regulatory frameworks, the strategy emphasizes technological leadership, industrial resilience, and closer collaboration between government and the private sector to strengthen cybersecurity while accelerating innovation. It also highlights the importance of securing emerging technologies, including artificial intelligence systems, advanced computing infrastructures, and the transition toward post-quantum cryptography, recognizing that AI models, training pipelines, and data infrastructures are rapidly becoming critical assets that must be protected against manipulation, theft, or misuse.
In other words: in cyberspace, the decisive advantage will not belong to those who write the most rules, but to those who build the strongest technology.
The Washington vs Brussels Doctrine
There is a broader strategic debate emerging globally about how cybersecurity should be approached.
One school of thought focuses primarily on regulatory frameworks and compliance obligations, seeking to raise the baseline level of security through certification schemes, reporting duties, and detailed governance rules.
Another school emphasizes technological capability, encouraging industry to innovate faster, adopt advanced security technologies, and embed protection mechanisms directly into products and digital infrastructures.
Both perspectives aim to improve cybersecurity. But they differ in how they believe resilience is ultimately achieved: through compliance frameworks or through technological superiority.
The U.S. strategy clearly signals that the long-term advantage will belong to those who build stronger technology, protect their intellectual property, and move faster than their adversaries.
Software: The New Front Line
If cyberspace is becoming an arena of technological competition, then software itself is the terrain on which that competition is fought.
Attackers increasingly target the code that powers devices, machines, and digital platforms. They reverse engineer applications, manipulate firmware, bypass licensing controls, and extract proprietary algorithms. Increasingly, AI models and training pipelines themselves are becoming targets, as the intellectual value embedded in machine learning systems grows rapidly. In many cases, the objective is not only disruption but the silent exfiltration of intellectual property embedded within software systems.
When innovation resides in software, defending that software becomes essential to defending the business.
Securing the Software Supply Chain
One of the key themes in the strategy is the protection of critical infrastructure and supply chains, including the operational technologies that underpin modern industry.
For technology vendors and manufacturers, this highlights a crucial point: cybersecurity must extend beyond network defenses to the entire software lifecycle.
Security must accompany software from development to deployment and throughout its operational lifetime. This includes:
- protecting code against reverse engineering and tampering
- ensuring the integrity and authenticity of firmware and software updates
- controlling how software is used, activated, and licensed
- preventing unauthorized duplication or redistribution
Without such protections, even highly sophisticated network defenses cannot prevent the theft or misuse of intellectual property embedded within software products.
Moving Beyond Compliance Toward Technical Enforcement
Around the world, policymakers are introducing new regulatory frameworks intended to improve cybersecurity. While these regulations help define security objectives, real resilience ultimately depends on technical mechanisms built directly into software systems.
Security implemented at the application level enables organizations to:
- protect sensitive algorithms and intellectual property
- enforce licensing and usage rights
- secure software distribution and update chains
- maintain control over digital assets across distributed environments
- integrate cryptographic protection mechanisms that remain robust even in the face of future computing paradigms, including post-quantum cryptography
- protecting AI models and data pipelines from unauthorized extraction or manipulation
This architectural approach ensures that protection remains effective even after software has been deployed in devices, machines, or customer environments.
Cybersecurity as an Enabler of Digital Business Models
Protecting software does more than mitigate risk: it also enables new forms of digital value creation.
Manufacturers and software publishers are increasingly adopting new monetization strategies, including:
- feature-on-demand capabilities
- subscription-based software models
- usage-based licensing
- secure remote updates and upgrades
These models rely on the ability to securely control how software operates after deployment. Without strong protection and licensing technologies, these digital business models become difficult to sustain.
A Software-Defined Future
As industrial systems become increasingly software-defined, cybersecurity must evolve accordingly.
Policies such as the new U.S. cyber strategy highlight the growing recognition that protecting innovation, intellectual property, and critical technologies is essential to economic growth and technological leadership.
For software vendors and technology manufacturers, the implication is clear: cybersecurity must be embedded into the architecture of the software itself.
In a world where innovation increasingly resides in code, protecting software is no longer just a technical task: it is a strategic requirement for long-term competitiveness.
