Category Cyber & Information Warfare

Enhancing endpoint protection needs to be a top priority for civilian & military

endpointsecurity

Nation-states, organised crime, hacktivists and deliberate and unintentional insider attacks are at risk of organisations of all sizes. Endpoints such as mobile devices, desktops, laptops, and even medical and IoT devices are a popular attack vector, and the goal of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA OPS-5G to mitigate security threats facing 5G and future wireless networks in military appliations

OPS 5G.width 880

5G is the latest in a series of evolutions in public mobile networking, with widespread coverage and access on a subscription basis. 5G networks are characterized by improved capabilities across a variety of measures, including throughputs, latencies, numbers of devices,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Quantum cryptography vulnerable to hacking too, Researchers developing hackerproof MDI QKD schemes to enhance network encryption

quantum computers quantum key distribution quantum networks 39 638

With the age of quantum computing drawing ever-closer, traditional encryption methods are at risk. While brute force attacks can take months to break through security, quantum attacks can use more advanced techniques to break standard public key cryptography in a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Navies developing cyber security measures and cyber defense technologies to counter growing cyber threats

HolisticEnterpriseApproachtoCybersecurity

Ships are increasingly using systems that rely on digitization, integration, and automation. Offensive actors understand the naval reliance on communications, ISR, and visualization technologies, and perceive them as vulnerable to disruption and exploitation. In 2016, the Baltic and International Maritime Council (BIMCO) in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Multi-factor authentication has become essential to protect accounts in commercial and military

MFA 1

The traditional, not so secure way to log in to your bank account: enter your username and that familiar password you probably use for most of your online accounts. Then, you’re in. You can go about your business. If you’re…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Australia facing cyber attacks by sophisticated state-based cyber actor, implementing Cyber Vision 2020, cyber security strategy, cyber science and technology plan

6c16f95e5837b7a15cc22a32eb72fad8

The exponential growth of information and communications technology (ICT) technology that includes Internet, telecommunications networks, computer systems, and embedded processors and controllers, has led to creation of Cyberspace, a global domain within ICT. The economic, social and strategic influence is…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Industry launch transparent, persistent and pervasive encryption solutions to prevent data breaches

z14 pervasive encryption

Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Data centers are attractive, lucrative targets for cyber criminals and nation-states, require security meaures & technologies

cybersecuritydatacenter

Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Indian Threat Scenario, National security threats and future military capability requirements

multidomainmilitary

There are two approaches to connect Warfighting and emerging technologies. One is to consider the present and future threat environment and then through system analysis we can identify technologies required to mitigate those threats. Secondly, we can identify the emerging…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising security threats to Smart homes their security requirements and measures for protection

smarthomesecurity

A smart home refers to a convenient home setup where appliances and devices can be automatically controlled remotely from anywhere with an internet connection using a mobile or other networked device. Devices in a smart home are interconnected through the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here