The Planetary Security Conference 2019, which concluded on 20 February, saw a number of workshops being held on the Sahel region and specifically Mali, one of...
As the May 2019 EU elections loom and a new European Commission takes office, climate action can become a key driver of a reformed EU project for more...
Kilosa, a district of the Morogoro region in Eastern Tanzania, has a history of resource-related conflicts surrounding land and forest tenure and management...
This primer explains the current situation concerning the United Kingdom’s food supply and how this is likely to change in the medium and long term as a result...
Large-scale agribusiness projects in Senegal engendered protests from villagers and pastoralists occupying the land who already face pressures from the effects...
The so-called Vulnerable Twenty (V20) Group was established in October 2015 with the inaugural meeting of the V20 Ministers of Finance at the Climate Vulnerable...
Climate change threatens conflict and poverty in the Arab region, according to the UN Development Programme (UNDP). In a report published last week, the agency...
With the building of one of the world’s largest hydroelectric dams on the Blue Nile River, Ethiopia sets a new phase of development for the country and...
Achieving Zero Hunger in Europe and Central Asia requires supporting smallholders and family farmers to reduce poverty and, in the face of climate change...
WATCH: It cannot be overstated how valuable regional cooperation is for tackling the security dimensions of climate change. Ayan Mahamoud, Platform Coordinator...
The Lake Chad Basin is afflicted with a multidimensional crisis, which contributing factors range from deeply-entrenched regional hostilities to environmental...
As the so-called Islamic State loses control over the areas it once occupied, it is leaving behind a toxic legacy. The initial findings of a scoping mission...
The Syrian crisis and the multi-year drought that preceded it have become emblematic of contemporary discussions about the possible security implications of...