Latest projects

"We are neighbours. Russia is part of Greater Europe. The European Union is a major player in the European space, but it is not the whole of Europe, n...

Shaping the next generation of experts is the main goal of the education and training system on nonproliferation, created and supported by PIR Center...

All projects

PIR Center recommends to read

Sharon Squassoni

The recent PIR Center report, “Iran in the Regional and Global Perspective” offers a fresh twist on advice for negotiators as they continue to work on an agreement. As a compilation of articles by experts who met in Bangkok and Moscow in 2014 to explore the prerequisites of longer term solutions for...

The book “The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy” by David Hoffman is a true documentary thriller focusing on the most difficult period of the 20th century. The international situation at that time is described as teetering on the brink of a nuclear world ...

All articles

Articles

Select period

On November 7, 2013 Chairman of PIR Center Executive Board Michael Yakushev delivered a lecture on “The Challenge of Cyber-Security: Prospects for Global Governance of the Internet?” in the framework of the Seminar organized by the James Martin Center for Nonproliferation Studies (CNS) at the Monter...

There are various ongoing activities and programs of the Indian Government to address the cyber security challenges which have significantly contributed to the creation of a platform that is now capable of supporting and sustaining the efforts in securing the cyber space. Due to the dynamic nature o...

For quite a short period of time starting from July 2013 the fugitive American intelligence analyst Edward Snowden has revealed huge amounts of classified information about America's and Britain's clandestine surveillance and intelligence gathering in the Internet and other communication networks.
Ol...

Today effective cyber defenses assume higher levels of trust for automated threat sharing, but increased threat sharing also increases one`s vulnerability to new kinds of targeted threats from those with who have learned about your weaknesses. We have moved from a simple world where a threat could b...

Identification of internet users, owners of internet content and technical infrastructure, as well as persons providing various services via the internet, has undoubtedly become one of the hottest topics of discussions between representatives of government agencies and the expert community. As far a...

In the French White Paper on Defence and National Security presented by the President in June 2008, information systems security emerged, alongside deterrence, as an area in which the sovereignty of France should be fully expressed. More collective work remains to be done in order to fully achieve t...

loading