TechnologyEU Warns of Over-Reliance on Foreign Technology

EU Warns of Over-Reliance on Foreign Technology

Key Takeaways

  • The European Union is seeking to reduce its dependence on foreign technologies and promote its own digital sovereignty.
  • The EU’s executive vice president for tech sovereignty, Virkkunen, emphasizes the importance of developing European technology companies and products.
  • Public contracts and procurement can be used to support the growth of European tech companies.
  • The EU is considering plans to "Buy European" and ensure that billions in procurement contracts flow to EU businesses.
  • The EU’s efforts to promote digital sovereignty come at a sensitive time in transatlantic relations, following recent tensions with the US.

Introduction to the EU’s Digital Sovereignty Efforts
The European Union is taking steps to promote its digital sovereignty and reduce its dependence on foreign technologies. This effort comes at a particularly sensitive time in transatlantic relations, following recent threats by US President Donald Trump to take over Greenland, which has forced European politicians to consider retaliation. The EU’s executive vice president for tech sovereignty, Virkkunen, has emphasized the importance of developing European technology companies and products, and has suggested using public contracts as a way to support their growth.

The Importance of Digital Sovereignty
Virkkunen declined to single out the United States as one of the partners that the EU must de-risk from, instead pointing to the Covid-19 pandemic and Russia’s invasion of Ukraine as incidents that highlight Europe’s vulnerabilities. She noted that the US is a key partner, but also emphasized that it is essential for the EU to have its own capacity and not be dependent on others. This sentiment is echoed by other EU officials, who recognize that the EU’s digital sovereignty is crucial for its competitiveness and security.

Using Public Contracts to Support European Tech
The Commission’s executive vice president for tech sovereignty has swung behind the idea of using public contracts as a way to support the development of European technology companies and products. Virkkunen suggested that public procurement can be used to boost the growth of European technologies, and that the EU should use this tool more actively. This approach is in line with plans being pushed by the French EU commissioner, Stéphane Séjourné, to ensure that billions in procurement contracts flow to EU businesses. The plans, which are due to be outlined in an upcoming Industrial Accelerator Act, have been delayed multiple times, but are seen as a key part of the EU’s efforts to promote digital sovereignty.

The "Buy European" Initiative
The "Buy European" initiative is a key part of the EU’s efforts to promote digital sovereignty. The initiative aims to ensure that EU businesses receive a significant share of procurement contracts, and is seen as a way to support the growth of European tech companies. The initiative has been championed by Séjourné, who has argued that it is essential for the EU to support its own businesses and promote its own digital sovereignty. While the initiative has been delayed, it is expected to be outlined in the upcoming Industrial Accelerator Act, and is seen as a key part of the EU’s efforts to reduce its dependence on foreign technologies.

Conclusion and Future Directions
In conclusion, the EU’s efforts to promote digital sovereignty are a key part of its efforts to reduce its dependence on foreign technologies and promote its own competitiveness and security. The use of public contracts and procurement to support the growth of European tech companies is a key part of this effort, and the "Buy European" initiative is seen as a way to ensure that EU businesses receive a significant share of procurement contracts. As the EU continues to navigate a complex and rapidly changing digital landscape, its efforts to promote digital sovereignty are likely to remain a key priority. The EU’s ability to promote its own digital sovereignty will have significant implications for its relationships with other countries, including the US, and will be closely watched by policymakers and industry leaders around the world.

- Advertisement -spot_img

More From UrbanEdge

US-Iran Conflict Live Updates: Trump Demands Iran Stand Down; US Consulate Stormed

Breaking: U.S. service members killed after Iran's retaliatory strikes on bases. Trump demands Iran's complete stand down. Global tensions rise as China's condemnation and protests unfold. Israeli military plans more strikes; Iran's retaliation intensifies. The next 48 hours could define a regional conflict...

F1 Aus GP Changes: Middle East Conflict Cancels Key Event

The Middle East conflict has led to the cancellation of Pirelli's tyre test in Bahrain, impacting F1 Australian GP logistics. Iranian strikes closed airports, forcing teams to reroute flights. While Melbourne remains on schedule, concerns loom over the upcoming Bahrain and Saudi Arabian Grands Prix...

Oracle Red Bull Racing Partnership: Multi-Year Deal Powers Data-Driven Performance

Oracle and Red Bull Racing extend their groundbreaking partnership, integrating Oracle's advanced AI and cloud technologies into all aspects of race operations. This deal empowers Red Bull Ford Powertrains to excel under the impending F1 regulation shifts and debut revolutionary AI strategy agents trackside in 2025...

Microsoft Bug Hides Mouse Pointer in Classic Outlook Fix

Microsoft has confirmed a bug in classic Outlook that causes the mouse pointer to disappear, affecting usability. The issue also impacts OneNote and other 365 apps. Microsoft is working on a fix, but in the meantime, users can try temporary workarounds involving PowerPoint to navigate blindly...

Fake Job Recruiters’ Malware in Developer Coding Challenges

Cybercriminals are exploiting developer job hunts by embedding malware in coding challenges. These attacks are effective as they leverage routine aspects of the developer workflow. Fake recruiters promise unrealistic salaries while embedding malicious code, making vigilance crucial for job-seekers in the tech industry...

Business Data, Emails & Browsing History Theft by Malicious Chrome Extensions

Cybercriminals exploit Chrome extensions to access confidential business data, emails, and browsing history from millions of users. These malicious tools often disguise themselves as legitimate productivity extensions, putting unsuspecting users at risk. Discover how to identify threats and protect your sensitive information from stealthy cyber intrusions...

Valentine’s Day Cyber Threats & Risks: Protect Yourself

Valentine's Day creates a perfect storm for cybercriminals, with romance scams accounting for $697 million in losses and phishing attempts spiking by 28%. Protect yourself by employing security measures like two-factor authentication and understanding swift actions post-scam to minimize risk and financial damage...

PlayStation 2026 State of Play Games Reveals & Announcements

PlayStation's 2026 State of Play unveiled over 15 new titles, including a surprise God of War spin-off and a remake of the original trilogy. Fans thrilled over the John Wick game reveal featuring Keanu Reeves, with new IPs and third-party revivals like Castlevania also showcased...

Queensland Flood Alerts: Storms to End Extreme Heatwave

Queensland Flood Alerts: Storms to End Extreme Heatwave Projected Rainfall...
- Advertisement -spot_img