PIR Center consultant Oleg Demidov describes the role of the Verisign corporation in the DNS root zone management, comments on the process U.S. Department of Trade’s withdrawal from direct contractual relationship with the technical management of the root zone, and looks at the potential impact of c...
tags
Popular articles
On July 16, 2018, President Putin and President Trump finally held their first summit in Helsinki. The summit did not yield specific agreements in arms control domain, which means the current problems will have to be addressed by next U.S.-Russia summit. Now there are only two major arms control ...
Some time ago the U.S. administration, including their former President Barack Obama, has voiced more and more often the idea that it would be desirable to continue strategic offensive reductions. There are several reasons why the United States are so interested in intensifying nuclear arms reduct...
Latest projects
Shaping the next generation of experts is the main goal of the education and training system on nonproliferation, created and supported by PIR Center...
The project Global Internet Governance and International Information Security is part of the PIR Center Emerging Technologies and Global Security prog...
PIR Center recommends to read
The recent PIR Center report, “Iran in the Regional and Global Perspective” offers a fresh twist on advice for negotiators as they continue to work on an agreement. As a compilation of articles by experts who met in Bangkok and Moscow in 2014 to explore the prerequisites of longer term solutions for...
The book “The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy” by David Hoffman is a true documentary thriller focusing on the most difficult period of the 20th century. The international situation at that time is described as teetering on the brink of a nuclear world ...
Articles
The article provides detailed observations of the Transparency Reporting practiced adopted my major ICT corporations quite recently. The author aims to track how the revelations made by Edward Snowden in Summer 2013 influenced the format of transparency report and its adoption by major actors of the...
On November 7, 2013 Chairman of PIR Center Executive Board Michael Yakushev delivered a lecture on “The Challenge of Cyber-Security: Prospects for Global Governance of the Internet?” in the framework of the Seminar organized by the James Martin Center for Nonproliferation Studies (CNS) at the Monter...
There are various ongoing activities and programs of the Indian Government to address the cyber security challenges which have significantly contributed to the creation of a platform that is now capable of supporting and sustaining the efforts in securing the cyber space. Due to the dynamic nature o...
For quite a short period of time starting from July 2013 the fugitive American intelligence analyst Edward Snowden has revealed huge amounts of classified information about America's and Britain's clandestine surveillance and intelligence gathering in the Internet and other communication networks.
Ol...
Today effective cyber defenses assume higher levels of trust for automated threat sharing, but increased threat sharing also increases one`s vulnerability to new kinds of targeted threats from those with who have learned about your weaknesses. We have moved from a simple world where a threat could b...
It is not Iran that the story of Flame begins with. The first versions of this malware, or rather of its prototype, were found by the American company Webroot Сommunity in late 2007 in Europe. The following year the virus was spotted in the UAE. At the time of its detection in early May 2012, Flame ...