Latest projects

The project Global Internet Governance and International Information Security is part of the PIR Center Emerging Technologies and Global Security prog...

The project Emerging Technologies and Global Security is part of the PIR Center eponymous program and aimed at exploring the potential for cooperation...

All projects

PIR Center recommends to read

Sharon Squassoni

The recent PIR Center report, “Iran in the Regional and Global Perspective” offers a fresh twist on advice for negotiators as they continue to work on an agreement. As a compilation of articles by experts who met in Bangkok and Moscow in 2014 to explore the prerequisites of longer term solutions for...

The book “The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy” by David Hoffman is a true documentary thriller focusing on the most difficult period of the 20th century. The international situation at that time is described as teetering on the brink of a nuclear world ...

All articles

Articles

Select period

Valdai

November 20, 2020

Russia’s negative image as a “cyber aggressor” makes it more difficult for it to suggest arguments on the peaceful use of information technology to the Americans. The search for a common denominator is complicated by the fact that Moscow and Washington have completely differ...

The Department of Defense on Feb. 12, 2018 released the "Summary of the 2018 Department of Defense Artificial Intelligence Strategy: Harnessing AI to Advance Our Security and Prosperity". The strategy outlines how DOD will leverage AI into the future.

Key tenets of the strategy:

  • accelerating the ad...

According to US President D. Trump, the document is "first fully articulated cyber strategy in 15 years".

The strategy describes how the Donald Trump administration will:

  • Defend the homeland by protecting networks, systems, functions, and data;
  • Promote American prosperity by nurturing a secure, thri...

In the strategy, the US Department of Homeland Security has identified 7 key goals in the sphere of cybersecurity , the achievement of which will also deter malicious cyber activity, preventing opponents of the United States from gaining access to servers and imposing costs on those who try to use c...

«Achieve and Maintain Cyberspace Superiority Command Vision for US Cyber Command» - is the founding document of US Cyber Command and a guide to cyberspace operations.

Valdai

November 4, 2020

 

Despite its modern weapons and technology, mankind is still profoundly imperfect. Unfortunately, human evolution has proceeded not through intellectual and moral improvement, but through the search for ways to technically intervene in the system of thinking and motivation i...

(1-6/787) < Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Next >
loading