Category Cyber & Information Warfare

New Physical and behavioral Biometrics technologies with increased accuracy and security being developed

biometrics 5 638

Identity theft is increasingly a 21st-Century problem. As more data moves off of physical paper and onto Internet-connected servers, the chances of that data getting stolen increases as well. According to the FTC, there were 2.8 million fraud reports from…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising DNS attacks require DNS security measures and Protective DNS says Joint NSA and CISA Guidance

DNS spoofing

The Domain Name System (DNS) is central to the operation of modern networks, translating human-readable domain names into machine-usable Internet Protocol (IP) addresses. Email services, chat services and even social networks rely on DNS to work 24 hours a day,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Artificial Intelligence and Machine Learning are enabling the future of fully automated Cyber Security

artificial intelligence and machine learning for cybersecurity 15 638

AI emulates human cognition – i.e. learning based on experience and patterns, rather than by inference (cause and effect). Artificial intelligence covers everything from machine learning to business intelligence. Machine learning is a branch of artificial intelligence (AI) that refers…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

USAF Agile Cyber Technology 3 (ACT 3) to develop enabling technologies to achieve cyber superiority.

Cyberspace is essential to all Air Force (AF) missions. It is a domain in which, from which, and through which AF missions are performed. Actions in cyberspace can have digital, kinetic, and human effects. Increasingly, the cyberspace domain is contested…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA developing GPS backup and beyond Technologies for GPS denied and degraded environments

GPS0217 darpa adaptable navigation sensors graph

The GPS system provides critical positioning capabilities to military, civil, and commercial users around the world. The Global Positioning System (GPS), is a global navigation satellite system (GNSS) that provides location and time information in all weather conditions, anywhere on or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Industry preparing for Post Quantum or Quantum proof cryptography as Quantum computers threaten global communication digital infrastructure

symmetric asymmetric crypto diagramv2

Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, especially in an always connected, always online world. In addition, cryptography’s applications open up new opportunities and markets: digital signatures or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Militaries adopting rugged 5G enabled Notebooks, tablets and smart phones into tactical operations, however their vulnerability requires secure solutions

tablets

Military is increasingly looking to commercial ICT devices like Smartphones and tablets and they are rapidly making their way into military operations. Mobility continues to transform how the Department of Defense (DoD) operates, connects, and supports its stakeholders – most…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Photoacoustic Imaging enable Seeing Through Solids, hackproof Biometrics and Image Underwater Objects

photoacoustics

Alexander Graham Bell discovered photoacoustics by accident when he was working on the development of the photophone, a followup to his recently developed telephone that operated via modulated sunlight instead of electricity. You would operate a photophone by speaking into its…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s AMP to develop rapid, assuredly safe, and scalable software patches for reducing vulnerabilities of mission-critical systems

patch management process showing scan the network Slide01

Our society’s infrastructure is increasingly dependent on software deployed on a wide variety of computing devices other than commodity personal computers, such as industrial equipment, automobiles, and airplanes. Unlike commodity computers that have short upgrade cycles and are easily replaceable…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Large Biohacking or DIY biology growth, to hack human brains and their bodies, with desire to improve performance, cure chronic diseases and live longer

biohacking

Just as computers could be hacked and made to perform according to one’s wishes, now you hack your own body, a concept called Biohacking. It can be as simple as implementing lifestyle and dietary changes that improve the functioning of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here