News
D-ARCH Architecture D-BAUG Civil, Environmental and Geomatic Engineering D-BIOL Biology D-BSSE Biosystems Science and Engineering D-CHAB Chemistry and Applied Biosciences D-EAPS Earth and Planetary ...
Foreign and Security Policies as a Legal Problem between Center and Regions Author(s): Mikhail Rykhtik, Alexander Sergounin Series: Project Regionalization of Russian Foreign and Security Policy ...
Edward Jackson is a Senior Program Officer in the Mediation Support Team at the Center for Security Studies (CSS), ETH Zurich. He works on the Ceasefire Project - a joint initiative with the Centre ...
Digital extortion, with ransomware as its most prominent form, has become one of the most disruptive cyber threats in recent years. Ransomware locks access to systems or data until a ransom is paid, ...
This research project examines how various groups conduct cyber operations and the organizational structures that support them. Its value lies in the in-depth exploration of the role cyber effect ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
external page To the Publication Deterrence theory helps conceptualize how threats can be used and communicated to influence or alter an adversary’s behavior. Deterrence by denial reduces the ...
Policymakers and strategists increasingly refer to the “rules-based order” (RBO). A variety of governments and institutions, including the US, Australia, Japan, India, Canada, France, Germany, ...
Western states increasingly face attacks that fall into a gray zone between war and peace. The outbreak of a conventional war on European soil has accentuated this trend. In order to describe this ...
Neither Switzerland nor the EU are directly threatened by large-scale and prolonged power outages this winter; Ukraine is. The issues surrounding the security of power grids, energy supply, and energy ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
At the NATO Summit in Wales nearly a decade ago, NATO recognized that cyber defense is an inseparable part of collective defense. Therefore, a cyberattack against one or more member states can trigger ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results