Latest projects

Shaping the next generation of experts is the main goal of the education and training system on nonproliferation, created and supported by PIR Center...

The project Global Internet Governance and International Information Security is part of the PIR Center Emerging Technologies and Global Security prog...

All projects

PIR Center recommends to read

Sharon Squassoni

The recent PIR Center report, “Iran in the Regional and Global Perspective” offers a fresh twist on advice for negotiators as they continue to work on an agreement. As a compilation of articles by experts who met in Bangkok and Moscow in 2014 to explore the prerequisites of longer term solutions for...

The book “The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy” by David Hoffman is a true documentary thriller focusing on the most difficult period of the 20th century. The international situation at that time is described as teetering on the brink of a nuclear world ...

All articles

Articles

Select period

Today the BRICS states have become one of the most massive and rapidly growing segments of the global internet community. In 2013 total number of internet users in BRICS states exceeded 900 mln (which accounted for 38% of the world’s internet audience) while still experiencing a meteor growth rangin...

Currently there is no need to stress the fact that BRICS states have become on the most massive and at the same time the most rapidly growing segments of the global internet community. Enough to mention that in 2013 total number of internet users in BRICS states exceeded 700 mln (or 30% of the world...

On November 7, 2013 Chairman of PIR Center Executive Board Michael Yakushev delivered a lecture on “The Challenge of Cyber-Security: Prospects for Global Governance of the Internet?” in the framework of the Seminar organized by the James Martin Center for Nonproliferation Studies (CNS) at the Monter...

There are various ongoing activities and programs of the Indian Government to address the cyber security challenges which have significantly contributed to the creation of a platform that is now capable of supporting and sustaining the efforts in securing the cyber space. Due to the dynamic nature o...

For quite a short period of time starting from July 2013 the fugitive American intelligence analyst Edward Snowden has revealed huge amounts of classified information about America's and Britain's clandestine surveillance and intelligence gathering in the Internet and other communication networks.
Ol...

Today effective cyber defenses assume higher levels of trust for automated threat sharing, but increased threat sharing also increases one`s vulnerability to new kinds of targeted threats from those with who have learned about your weaknesses. We have moved from a simple world where a threat could b...

loading