View Sub-Topics

Featured

Events

View all

Poland, NATO, and the Future of Eastern European Security

Chinese Influence Operations in the Democratic World June 20 Event

Driving NATO’s Military Transformation Agenda Forward June 20 Event

Experts

View all

Publications

View all

In the Media

View all

All Research

Cyber Security in the Cloud: One or Multiple Cloud Service Providers?

William Schneider

There are compelling reasons for federal departments and agencies to move from a decentralized, ad hoc IT architecture to a cloud-based architecture...

Continue Reading

The Kim Family Business: After Singapore, What’s Next?

Jack David

The regime’s actions over decades show that conquering South Korea has been its No. 1 goal. Let’s hope that has changed...

Continue Reading

How the Five Eyes Can Win the Race for Quantum Computing Supremacy

Thomas Keelan

Since China started quantum computing research in 2004, it has invested over 30 times more than America in this revolutionary technology...

Continue Reading