The establishment of the Conference on Security and Co-operation in Europe (CSCE) was a long-standing Soviet idea that gained traction in the 1970s. From 1973 to 1975, East and West engaged in a ...
The Bulletin 2025 begins with an interview with Federal Councillor Martin Pfister, Head of the Federal Department of Defense, Civil Protection and Sport (DDPS), in which he discusses the security ...
In a time of multiple, overlapping crises and tectonic geopolitical and economic shifts, Swiss security policy also faces major challenges. The CSS focuses on analyzing and assessing the security ...
The growing complexity of border-transcending security issues confronts the international community with a plethora of challenges. Within the topic of “Global Security”, we examine how geopolitical ...
The world is undergoing a precarious transition marked by geopolitical tensions, economic disruption, fragmented global governance and weakening multilateralism. This volatility is notably exemplified ...
This issue of the Russian Analytical Digest draws attention to Russia's evolving relationship with Tatarstan and the Chechen Republic. First, it discusses power sharing between Tatarstan and Moscow.
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
Bestandesaufnahme der Schweizerischen Sicherheitspolitik vor dem Hintergrund der aktuellen globalen sicherheitspolitischen Entwicklungen. Es beleuchtet dieses Jahr unter anderem die Bedeutung eines ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by ...
Historically, discussions on cyber conflict have primarily centered on the involvement of state-sponsored or affiliated groups. Yet, the growing prominence of criminal actors – specifically, ...
This book tries to answer the following seven questions: ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results