Disruptive events like storms, floods, earthquakes, pandemics, and terrorist attacks threaten the functioning of society and the well-being of individuals. Overarching trends like climate change and ...
The risk and resilience reports provide a focused discussion of aspects of security risks and vulnerabilities, risk analysis and management, emergency preparedness, and crisis management – often with ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by ...
Space systems are an integral part of modern war fighting. Militaries use them to conduct everything from reconnaissance to communications and data transfers, mission planning, and maintain ...
This book tries to answer the following seven questions: ...
Voters are more pessimistic about the future of Switzerland (19%, +6 percentage points since January 2022) and the world (75%, +7 pp). When asked about the three greatest threats, war, climate and ...
This edited volume compiled by CSS director Andreas Wenger and Alex S. Wilner focuses on contemporary denial, bridging the theoretical gap that persists between classical deterrence theory and ...
This report by Anna Hess Sargsyan and Anna Möller-Loswick is structured around six key insights from the three workshops, with illustrative case examples from Syria, Kenya, Kosovo, Mozambique, and the ...
In response to Russia’s military aggression against Ukraine, the Federal Council took a clear stance in late February 2022, condemning the breach of international law “in the strongest possible terms” ...
This chapter addresses the types of cyber operations that were conducted against the space sector as well as the types of space entities that have been targeted by threat actors in the context of the ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results