In a time of multiple, overlapping crises and tectonic geopolitical and economic shifts, Swiss security policy also faces major challenges. The CSS focuses on analyzing and assessing the security ...
The internship is not degree-related. Applicants choosing to intern with the CSS are expected to play an active role in the work of the Center by: Contributing to the CSS’s existing research projects; ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by ...
Space is increasingly contested and congested. There are over 10,000 active satellites in space. This is a seven-fold increase compared to a decade ago. This rapid growth and the fact that there is no ...
In response to Russia’s military aggression against Ukraine, the Federal Council took a clear stance in late February 2022, condemning the breach of international law “in the strongest possible terms” ...
In four panels the Policy Workshop tackled three main questions facing European governments and semiconductor corporations: What are the main trends, developments, and strategies in the geopolitics of ...
This book tries to answer the following seven questions: ...
The civilian use of space has always gone hand in hand with its military use. During the Cold War, the Soviet Union’s launch of Sputnik 1 in 1957 and the US’s deployment of Explorer 1 in 1958 kicked ...
From the buildup of Russian tanks along the Ukrainian border to images of destruction raging through cities and villages, we all watched the war in Ukraine unfold with images from the sky. When Russia ...
This chapter addresses the types of cyber operations that were conducted against the space sector as well as the types of space entities that have been targeted by threat actors in the context of the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results