Elcano Royal Institute
Skip to content
Elcano Royal Institute Global Presence
  • Corporate Partners Programme
  • Subscribe
  • Español
  • English
  • ES
  • EN
  • Español
  • English
  • ES
  • EN
  • Topics
    • Globalization, development and governance
    • International Security
    • Democracy and citizenship
    • Climate and energy
    • Technology and economics
    • Future of Europe
    • Latin America
    • China, the US and the new world order
    • Challenges and opportunities in the neighbourhood
    • Influence and image of Spain
    • Specials
  • Publications
  • Experts
    • Elcano in Brussels
  • Projects
  • Events
  • About Elcano
    • Our mission and values
    • Juan Sebastián de Elcano
    • Corporate governance
      • Board of Trustees
      • Executive Committee
      • Protector Partners
      • Collaborating partners
      • Emeritus Trustees
    • ElcanoNet
      • Scientific Council
      • Advisory Council
      • Think tank networks
    • Research
      • Research agenda
      • Action Plan
      • Working Groups
    • The Elcano team
    • Elcano Alumni Network
    • Transparency
      • Annual Report
      • Bylaws
      • Finances
      • Good practices
Home / Topics / International Security / Page 15

International Security

St Pauls Churchyard at night (London, England, UK). Photo: Tudor Panait (@tudor_panait)
International Security Analyses

The National Cyber Force: directions and implications for the UK

The establishment of the National Cyber Force raises significant questions about the directions that the cybersecurity of the UK will now take

By Danny Steed
09 Feb 2021 //
17 mins Reading time
Great power rivalry in the Middle East. Rivalry in the Middle East, collage. Photo: Emma Muñoz Descalzo / ©Real Instituto Elcano.
International Security Experts Comments

Great power rivalry in the Middle East

Today three external powers –the US, China and Russia– are the leading players behind great power rivalry in the Middle East.

By Wojciech Michnik
18 Jan 2021 //
13 mins Reading time
Blue led panel. Photo: Adi Goldstein (@adigold1)
International Security Analyses

Hacking Back unpacked: an eye for an eye? Not so fast

Out of all the countries in the world, the hacking back debate has finally entered the political discourse in neutral Switzerland.

By Stefan Soesanto
14 Jan 2021 //
29 mins Reading time
Flags member countries at the NATO Headquarters in Brussels. Photo: NATO North Atlantic Treaty Organization (CC BY-NC-ND 2.0)
International Security Analyses

Horizon 2030: assessing the impact of socio-economic and governance issues on the future of the MENA Region

It is critical for NATO to understand the nature and the dynamics of the socio-economic and governance issues aggravating the instability in the MENA region.

By Chloe Berger
13 Jan 2021 //
17 mins Reading time
Abstract view of CPU Heat Sink. Photo: Michael Dziedzic (@lazycreekimages)
International Security Analyses

Artificial Intelligence and Cybersecurity: a promising but uncertain future

The adoption of AI-based solutions to achieve cyber-defensive/offensive objectives (“AI for Cybersecurity”) is promising but challenging too.

By Matteo E. Bonfanti
09 Dec 2020 //
20 mins Reading time
Person walking along corridors. King's Cross, London (UK). Photo: Graeme Worsfold (@worsfold)
Future of Europe Analyses

Implications of the UK’s Russia Report for the next National Cyber Security Strategy

This article assesses the implications of the recent Russia Report ahead of the development of the next cyber security strategy for the UK due in 2021.

By Danny Steed
13 Oct 2020 //
18 mins Reading time
Cibersecurity in Latin America and the Caribean
International Security Analyses

Balancing between giants, Latin-America’s international cybersecurity position

Latin American states have benefited from regional cooperation to improve their cybersecurity but are not leveraging this cooperation for issues of international peace and stability in cyberspace.

By Nathalie Van Raemdonck
14 Sep 2020 //
14 mins Reading time
China in the security conundrum of the eastern Mediterranean. Chinese Development Notice at Lake Assal (Djibouti). Photo: Michael Edward Walsh (CC BY-NC-ND 2.0)
International Security Experts Comments

A new kid on the block? China in the security conundrum of the eastern Mediterranean

China is a newcomer to the eastern Mediterranean. How does Beijing fit into the complex setting of the eastern Mediterranean?

24 Jul 2020 //
6 mins Reading time
Screenshot of "Mr. Tumputin", a deepfake video by spiegelball
International Security Analyses

The weaponisation of synthetic media: what threat does this pose to national security?

The weaponisation of hyper-realistic synthetic video, audio, images, or texts –generally known as of synthetic media– may affect national security.

By Matteo E. Bonfanti
14 Jul 2020 //
22 mins Reading time

Tags

  • European Union
  • United States
  • International relations
  • Geopolitics
  • Security and defence
  • International economics
  • China
  • International conflicts
  • Russia
  • Digitalisation
  • European integration
  • Spain
  • Governance
  • Public opinion
  • Elections

Latest Publications

A daytime aerial view of Gran Vía in Madrid (Spain) on a sunny day. Buildings of various colours and architectural styles line both sides of the avenue. In the centre, the road and pedestrian area are filled with vehicles and pedestrians moving in various directions.

Immigration and the labour market in Spain

March 17, 2026

Entrada norte de la sede del Banco Central Europeo. En primer plano, un cartel con el logo del Banco Central y una inscripción que indica que se trata de la entrada norte y la dirección de esta. Detrás, el edificio acristalado de gran altura del Banco Central y, al fondo, un cielo luminoso, aunque muy nublado. La imagen fue tomada en el encuentro del presidente del Consejo Europeo, António Costa, con la presidenta del Banco Central Europeo, Christine Lagarde.

Eurobonds for European strategic autonomy: a financial proposal with geostrategic foundations

March 11, 2026

The interior of Malaga Airport, bustling with travellers. People walk in both directions and others wait in line to board. In the centre there are moving walkways and, on both sides, boarding gates and some shops. The space is large, white and with large windows that let in natural light.

The seventh regularisation of undocumented migrants in 40 years exposes the need for greater migratory policy planning

March 10, 2026

  • First page
  • Previous
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • Page 17
  • Page 18
  • Next
  • Last page

12 - 18 of 42 pages

  • Contact
  • Legal notice
  • Privacy Policy & Cookies
  • Credits
  • FAQs
  • Accessibility
  • Jobs

Follow us on social media:

Manage Cookie Consent
To provide the best experiences, we use technologies such as cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting, or withdrawing consent, may adversely affect certain features and functions..
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
The technical storage or access that is used exclusively for statistical purposes. El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
The technical storage or access is necessary to create user profiles to send advertising, or to track the user on a website or on several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View settings
  • {title}
  • {title}
  • {title}