Elcano Royal Institute
Skip to content
Elcano Royal Institute Global Presence
  • CORPORATE PARTNERS PROGRAMME
  • Subscribe
  • ES
  • EN
  • ES
  • EN
  • Topics
    • Globalization, development and governance
    • International Security
    • Democracy and citizenship
    • Climate and energy
    • Technology and economics
    • Future of Europe
    • Latin America
    • China, the US and the new world order
    • Challenges and opportunities in the neighbourhood
    • Influence and image of Spain
    • Specials
  • Publications
    • Expert Comments
    • Analyses
    • Policy Papers
    • Monographs
    • Reports
    • Surveys
    • Working Papers
    • Newsletters
  • Experts
    • Elcano in Brussels
  • Projects
  • Events
  • About Elcano
    • Our mission and values
    • Juan Sebastián de Elcano
    • Corporate governance
      • Board of Trustees
      • Executive Committee
      • Protector Partners
      • Collaborating Partners
      • Emeritus Trustees
    • ElcanoNet
      • Scientific Council
      • Advisory Council
      • Think tank networks
    • Research
      • Research agenda
      • Action Plan
      • Working Groups
    • The Elcano team
    • Talents and Elcano Alumni Network
    • Transparency
      • Annual Report
      • Bylaws
      • Finances
      • Good practices
Home / Themes / International Security / Page 10

International Security

The retreat of the West
Global Spectator Experts Comments

The retreat of the West

The withdrawal of troops by the West in Afghanistan highlights the lack of global governance and strategic plans.

By Andrés Ortega
07 Sep 2021 //
6 mins Reading time
NATO and the South a tale of three futures
International Security Monographs

NATO and the South: a tale of three futures

By Luis Simón
16 Jul 2021 //
2 mins Reading time
Millenium Bridge (London, England, UK). Photo: James Padolsey (@padolsey)
International Security Analyses

The UK’s Integrated Review and the future of cyber

Cyber is a centrally crucial element to the UK’s future vision of national security. The Integrated Review considers it as a core component of national power

By Danny Steed
01 Jul 2021 //
17 mins Reading time
Person holding a mobile phone on Black Friday shopping. Photo: CardMapr.nl (@cardmapr)
International Security Analyses

Understanding public reactions to cybersecurity incidents

This analysis offers a brief overview of how public opinion approaches and responds to cybersecurity incidents.

By Miguel Alberto Gomez
21 Jun 2021 //
15 mins Reading time
Young person with cell phone. Photo: Warren Wong (@wflwong)
International Security Analyses

Social ties and Jihadist terrorism: what turns violent radicalisation into terrorist involvement?

An analysis of the social ties that link a group of young people, radicalised into Jihadism in Spain, to various actors from the global Jihadist movement

By Álvaro Vicente
24 May 2021 //
25 mins Reading time
NATO Training Mission in Kabul (2011). Photo: U.S. Army photo by Bill Putnam/Released – NATO Training Mission-Afghanistan (CC BY-SA 2.0). Elcano Blog
Global Spectator Experts Comments

From Afghanistan to China: the pathology of victory

This year the war in Afghanistan will come to an end, in a phase involving both the US and NATO, following the withdrawal announced by Biden.

By Andrés Ortega
04 May 2021 //
6 mins Reading time
Alaa Salah, Civil Society Activist and Community Leader from Sudan, addresses the Security Council meeting on Women, Peace and Security in 2019. Photo: UN Women (CC BY-NC-ND 2.0)
International Security Analyses

Rekindling the Agenda on Women, Peace and Security: can the EU lead by example?

The terrain of war and peace is not gender neutral.

By Jessica Almqvist
23 Mar 2021 //
29 mins Reading time
St Pauls Churchyard at night (London, England, UK). Photo: Tudor Panait (@tudor_panait)
International Security Analyses

The National Cyber Force: directions and implications for the UK

The establishment of the National Cyber Force raises significant questions about the directions that the cybersecurity of the UK will now take

By Danny Steed
09 Feb 2021 //
17 mins Reading time
Great power rivalry in the Middle East. Rivalry in the Middle East, collage. Photo: Emma Muñoz Descalzo / ©Real Instituto Elcano.
International Security Experts Comments

Great power rivalry in the Middle East

Today three external powers –the US, China and Russia– are the leading players behind great power rivalry in the Middle East.

By Wojciech Michnik
18 Jan 2021 //
13 mins Reading time
Blue led panel. Photo: Adi Goldstein (@adigold1)
International Security Analyses

Hacking Back unpacked: an eye for an eye? Not so fast

Out of all the countries in the world, the hacking back debate has finally entered the political discourse in neutral Switzerland.

By Stefan Soesanto
14 Jan 2021 //
29 mins Reading time
Flags member countries at the NATO Headquarters in Brussels. Photo: NATO North Atlantic Treaty Organization (CC BY-NC-ND 2.0)
International Security Analyses

Horizon 2030: assessing the impact of socio-economic and governance issues on the future of the MENA Region

It is critical for NATO to understand the nature and the dynamics of the socio-economic and governance issues aggravating the instability in the MENA region.

By Chloe Berger
13 Jan 2021 //
17 mins Reading time
Abstract view of CPU Heat Sink. Photo: Michael Dziedzic (@lazycreekimages)
International Security Analyses

Artificial Intelligence and Cybersecurity: a promising but uncertain future

The adoption of AI-based solutions to achieve cyber-defensive/offensive objectives (“AI for Cybersecurity”) is promising but challenging too.

By Matteo E. Bonfanti
09 Dec 2020 //
20 mins Reading time

Tags

  • European Union
  • United States
  • International relations
  • Geopolitics
  • Security and defence
  • International economics
  • China
  • Russia
  • International conflicts
  • European integration
  • Digitalisation
  • Spain
  • Governance
  • Elections
  • Public opinion

Latest Publications

Exterior plaza of the Seville Conference and Exhibition Centre (FIBES) at dusk, featuring its illuminated dome, a symmetrical colonnade, and a glass façade. In the foreground, a mosaic with maps and the dates 1492–1992 commemorates the fifth centenary of the discovery of America. Aid

Understanding and overcoming the aid crisis

June 30, 2025

Three golden gears interlock over a map of Europe on a dark stone background; the left gear features the US flag, the right gear the Chinese flag, and the center displays a white question mark.

Quest for Strategic Autonomy? Europe Grapples with the US – China Rivalry

June 26, 2025

Abstract representation of a digital network with glowing interconnected points and lines on a dark blue background. Digital

PromethEUs Conference ‘Simplify to Compete: Rethinking EU Regulation for a Digital Future’

June 25, 2025

  • Previous Page
  • Page 1
  • …
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • …
  • Page 31
  • Next Page
  • Contact
  • Legal notice
  • Privacy Policy & Cookies
  • Credits
  • FAQs
  • Accessibility
  • Jobs

Follow us on social media:

Manage Cookie Consent
To provide the best experiences, we use technologies such as cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting, or withdrawing consent, may adversely affect certain features and functions..
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
The technical storage or access that is used exclusively for statistical purposes. El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
The technical storage or access is necessary to create user profiles to send advertising, or to track the user on a website or on several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View settings
{title} {title} {title}