Category Cyber & Information Warfare

Safeguarding the Future: Cybersecurity Labeling for Smart Devices

Introduction In today’s increasingly connected world, smart devices have become an integral part of our daily lives. From smart thermostats to fitness trackers and even smart refrigerators, these devices promise convenience, efficiency, and enhanced living experiences. However, as our reliance…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Revolutionizing Cybersecurity: DARPA’s INGOTS Program Takes Aim at Vulnerabilities

In an era where technology is seamlessly integrated into every facet of our lives, the security of digital systems has become paramount. From personal devices to critical infrastructure, vulnerabilities in software and hardware can expose us to an array of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Strengthening AI Cybersecurity: Exploring the Artificial Intelligence Bill of Materials Initiative by the U.S. Army

Introduction U.S. Army officials are considering an innovative approach to bolster their cybersecurity measures in the realm of artificial intelligence (AI). The Army is exploring the implementation of an Artificial Intelligence Bill of Materials (AI BOM) to gain transparency into…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Photonic Blockchains: More Energy-Efficient and Scalable Than Traditional Blockchains

Cryptocurrencies are digital currencies created using encryption algorithms. These alternative currencies require a blockchain — a type of digital ledger that records information such as transactions in a way that is difficult or impossible to change or hack. Blockchain is…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA Business Process Logic (BPL) Program: Enhancing Business System Security

In today’s interconnected world, business systems play a critical role in managing and controlling various workflows, including manufacturing, infrastructure, and logistics. These systems, known as Business Logic (BL), automate and streamline operations for governments and businesses globally. However, these BL…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The Dark Side of the Space Race: Cyber Attacks on Satellites and Low Earth Orbit Constellations.

The space race is back on. In recent years, there has been a renewed interest in space exploration, with private companies like SpaceX and Blue Origin vying to send humans back to the moon and beyond. But while the space…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Defending Space Assets: Cyber Security for Satellites and Low Earth Orbit Constellations

Constellation image Thinkstock 1

In recent years, there has been a growing interest in the use of satellites for a variety of applications, including communications, navigation, and Earth observation. This has led to the development of large constellations of satellites in low Earth orbit…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

How Military or Battlefield Internet of Things(MIoT /BIoT) Will Provide Information Dominance

The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Revolutionizing Cybersecurity for the Military: DARPA’s FIRE Program and the Future of Protecting Complex Cyber-Physical Systems

The military relies heavily on complex cyber-physical systems for a range of applications, including unmanned aerial vehicles (UAVs), weapon systems, communication networks, control systems, and surveillance systems. These systems incorporate both hardware and software components and are uniquely designed and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Hiding Messages in Plain Sight: Exploring the Art of Steganography

Steganography is the art of concealing a message or information within another seemingly innocent message. The word “steganography” comes from the Greek words “steganos,” meaning “covered,” and “graphein,” meaning “to write.” In other words, steganography is the art of hiding…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here