Category Cyber & Information Warfare

Revolutionizing Cybersecurity for the Military: DARPA’s FIRE Program and the Future of Protecting Complex Cyber-Physical Systems

The military relies heavily on complex cyber-physical systems for a range of applications, including unmanned aerial vehicles (UAVs), weapon systems, communication networks, control systems, and surveillance systems. These systems incorporate both hardware and software components and are uniquely designed and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Hiding Messages in Plain Sight: Exploring the Art of Steganography

Steganography is the art of concealing a message or information within another seemingly innocent message. The word “steganography” comes from the Greek words “steganos,” meaning “covered,” and “graphein,” meaning “to write.” In other words, steganography is the art of hiding…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The Growing Threat of Smartphone Security to National Security

Smartphones are ubiquitous in modern society, and their use has become increasingly prevalent in government agencies and other sensitive settings. However, this increasing reliance on mobile technology has also raised significant concerns regarding national security. Research indicates that smartphones pose…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Hidden Dangers: The Rising Threat of Steganography and Stegware Cyber Attacks

InsiderUseofSteganography

Steganography is the art of concealing a message or information within another seemingly innocent message. The word “steganography” comes from the Greek words “steganos,” meaning “covered,” and “graphein,” meaning “to write.” In other words, steganography is the art of hiding…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The Next Frontier in Encryption: Homomorphic Encryption the Future of Secure Computation

Fujitsuhomomorphc

Businesses, large and small, are embracing the Cloud. No matter which research company, vendor or expert you consult, everyone agrees that about four in every five enterprise workloads are either already in the Cloud or will be within the next…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA DPRIVE developing an ASIC for Fully homomorphic encryption (FHE) to ensure Data privacy and Security

Fully Homomorphic encryption

In the last few years, data privacy has become a hot-button issue globally, with high profile scandals and data leaks surrounding prominent companies like Facebook and Equifax resulting in greater privacy awareness among both consumers and businesses. On top of that,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

NATO cyber doctrine and command calls for enhancing Deterrence and cyber defense capabilities amid Russian and Chinese Cyber Warfare Threat

tumblr inline n9vvol6Olc1rpqqrk

The North Atlantic Treaty Organization is an alliance of European and North American countries formed after World War II as a bulwark against Russian aggression, as per The Associated Press. Its original members were Belgium, Canada, Denmark, France, Iceland, Italy,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber Resilience enables company to better prevent, quickly detect, contain, and recover from a cyberattack

Huntsman Cyber Resilience

This year has been largely dominated by the Russia-Ukraine war, with major concerns about its impact on the global threat level. Just three days after the invasion of Ukraine, on February 27th, Check Point Research (CPR) noted a 196% increase…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA HARDEN developing designs and tools for trusted computing systems

Hardware Trojans (HT), which are malicious circuit inclusions into the design from an adversary with an intention to damage the functionality of the chip at a much later date or leaking confidential information like keys used in cryptography. Time to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA CASTLE developing AI-toolkit for network hardening against advanced persistent threats (APT)

Computer networks are more than ever exposed to cyber threats of increasing frequency, complexity and sophistication. Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here