Visualizing Centrifuge Limits Under the Iran Deal
A visualization of potential certrifuge limits put in place as a feature of a comprehensive nuclear deal with Iran
A visualization of potential certrifuge limits put in place as a feature of a comprehensive nuclear deal with Iran
The current, attack‐centric approach to computer security is incapable of adequately defending nuclear facilities. This paper introduces a new approach, vulnerability‐centric security, which enables nuclear facility operators to prevent successful cyber‐attacks while enhancing the day‐to‐day operation of their systems.
Sponsored by NTI and undertaken by the Institute for Security and Safety at the University of Brandenburg, this report identified a set of criteria that reflect the basic, minimum security measures and regulatory requirements necessary to protect nuclear facilities against cyber attacks.
North Korea and Iran have been suspected of collaborating on missile development. Analysts closely compare the Nodong-X and Ghadr-1 for similarities. (CNS)
Over 150 states gathered at the UN to review the past and chart the future of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). (CNS)
More is known about Saudi Arabia's Strategic Missile Force capabilities due to the country's recent openness and open-source information. (CNS)
Sign up for regular updates on innovative, real-world solutions to existential threats.
{ location = 'https://www.nti.org/get-updates/' }, 300);">Get Updates