Skip to main content
European Union Institute for Security Studies

Main navigation

  • About us
    • Director
    • Analyst Team
    • Staff
    • Opportunities
  • Publications
    • Briefs
    • Chaillot Papers
    • Commentaries
    • Analysis
    • Books
  • Activities
    • Events
    • News
  • Topics
    • EU Foreign Policy
    • Global Governance
    • Security and Defence
    • Transnational Challenges
    • Strategic Foresight
  • Regions
    • Africa
    • Asia
      • CSCAP EU
    • Eastern neighbours and Russia
    • MENA
    • The Americas
    • Western Balkans
  • Projects
    • Advancing the Cyber Programme of Action (PoA)
    • Chips Diplomacy Support Initiative
    • Countering Foreign Interference
    • EU Cyber Direct
    • SCOPE

The EUISS is an agency of the European Union

Breadcrumb

  1. Home

Cyber

  • Default ct image

    The world’s digital future

    With the International Telecommunications Union’s (ITU) highest decision-making body currently meeting to discuss the organisation’s role in shaping future information and communications technology, this Alert explores its growing impact on internet governance.

    Alerts
    21 October 2014 By: Patryk Pawlak
  • Default ct image

    Riding the digital wave – The impact of cyber capacity building on human development

    This report on cybersecurity seeks to promote a development-focused approach to the issue. The authors address security not as an end in itself but rather as a means towards social, economic and political development, and argue that cyber capacity building is a developmental...

    Analysis
    19 December 2014 By: Patryk Pawlak
  • Default ct image

    Cyber jihadists and their web

    This Brief explains how the internet has increasingly become a tool for extremists to recruit new members, raise funds, and conduct new types of attacks. What can be done to stop the rise of cyber jihadism?

    Briefs
    30 January 2015 By: Patryk Pawlak, Beatrice Berton
  • Default ct image

    State-sponsored hackers: hybrid armies?

    With the virtual and physical worlds becoming ever more blurred, and the links between such hacker collectives and governments still unclear, is it still possible to set rules for governing cyberspace?

    Alerts
    30 January 2015 By: Patryk Pawlak, Gergana Petkova
  • Default ct image

    The threat of state-sponsored industrial espionage

    Industrial espionage – i.e. the theft of trade secrets, intellectual property, and scientific know-how from enterprises and research centres – is on the rise worldwide. This Alert assesses state-sponsored industrial espionage in peacetime, and seeks to highlight the threat it...

    Alerts
    5 June 2015 By: Massimo Pellegrino
  • Default ct image

    The dark side of the web: ISIL’s one-stop shop?

    With law enforcement agencies pooling resources to counter ISIL's online propaganda, this Alert seeks to raise awareness of the jihadists’ use of the so-called ‘Dark Web’, the hidden underbelly of the little explored Deep Web.

    Alerts
    26 June 2015 By: Beatrice Berton
  • Default ct image

    Space security for Europe

    This Report investigates opportunities for improving European strategic thinking on space security. It analyses potential threats to critical European space infrastructure, and offers ideas for improving space system resilience, reducing external dependence, and working with...

    Analysis
    7 July 2016 By: Gerald Stang, Massimo Pellegrino
  • Default ct image

    App and coming: an ‘Uber migration’?

    Migrant groups and host communities have developed a number of smart technology apps aimed at providing new arrivals with information on housing, education and employment opportunities. This Alert looks at how EU authorities can utilise these new technologies to help migrants...

    Alerts
    5 October 2016 By: Roderick Parkes
  • Default ct image

    Cybersecurity and democracy: Hacking, leaking and voting

    As they enter a period of critical elections, the US and European countries are being confronted by a series of threats from cyberspace. Electronic voting infrastructure and networks of political groups have recorded repeated intrusion, while strategic leaks of compromising...

    Briefs
    3 November 2016 By: Jakob Bund

Pagination

  • First page First
  • Previous page Previous
  • Page 1
  • Page 2
  • Page 3
  • Current page 4

Subscribe to our newsletter

We will keep you informed about our latest publications and analysis. You can unsubscribe at anytime. Find out more in our privacy notice

Subscribe

European Union Institute for Security Studies

Follow us:

  • Twitter
  • Facebook
  • Linkedin
  • YouTube
  • Bluesky
  • RSS Feeds

Footer menu

  • Document Register
  • Careers
  • Contact us

© EUISS 2026

The information on this site is subject to a Disclaimer, Copyright Notice, Cookies and Protection of personal data.