Latest projects

The project Global Internet Governance and International Information Security is part of the PIR Center Emerging Technologies and Global Security prog...

The project Emerging Technologies and Global Security is part of the PIR Center eponymous program and aimed at exploring the potential for cooperation...

All projects

PIR Center recommends to read

Sharon Squassoni

The recent PIR Center report, “Iran in the Regional and Global Perspective” offers a fresh twist on advice for negotiators as they continue to work on an agreement. As a compilation of articles by experts who met in Bangkok and Moscow in 2014 to explore the prerequisites of longer term solutions for...

The book “The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy” by David Hoffman is a true documentary thriller focusing on the most difficult period of the 20th century. The international situation at that time is described as teetering on the brink of a nuclear world ...

All articles

Articles

Select period

On November 26-28, 2014, Geneva Center for Security Policy  (GCSP) held the 17-th Strategic Analysis and Planning Seminar (SPAS) "Russia after Ukraine/Crimea: Last afterglow of the Cold War Era or Raise of the Big Player/Actor in the New Bipolar World?”. The leading Russian and international experts...

The article provides detailed observations of the Transparency Reporting practiced adopted my major ICT corporations quite recently. The author aims to track how the revelations made by Edward Snowden in Summer 2013 influenced the format of transparency report and its adoption by major actors of the...

On November 7, 2013 Chairman of PIR Center Executive Board Michael Yakushev delivered a lecture on “The Challenge of Cyber-Security: Prospects for Global Governance of the Internet?” in the framework of the Seminar organized by the James Martin Center for Nonproliferation Studies (CNS) at the Monter...

There are various ongoing activities and programs of the Indian Government to address the cyber security challenges which have significantly contributed to the creation of a platform that is now capable of supporting and sustaining the efforts in securing the cyber space. Due to the dynamic nature o...

For quite a short period of time starting from July 2013 the fugitive American intelligence analyst Edward Snowden has revealed huge amounts of classified information about America's and Britain's clandestine surveillance and intelligence gathering in the Internet and other communication networks.
Ol...

Today effective cyber defenses assume higher levels of trust for automated threat sharing, but increased threat sharing also increases one`s vulnerability to new kinds of targeted threats from those with who have learned about your weaknesses. We have moved from a simple world where a threat could b...

loading