Category Cyber & Information Warfare

Artificial Intelligence and Machine Learning are enabling the future of fully automated Cyber Security

artificial intelligence and machine learning for cybersecurity 15 638

AI emulates human cognition – i.e. learning based on experience and patterns, rather than by inference (cause and effect). Artificial intelligence covers everything from machine learning to business intelligence. Machine learning is a branch of artificial intelligence (AI) that refers…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

USAF Agile Cyber Technology 3 (ACT 3) to develop enabling technologies to achieve cyber superiority.

Cyberspace is essential to all Air Force (AF) missions. It is a domain in which, from which, and through which AF missions are performed. Actions in cyberspace can have digital, kinetic, and human effects. Increasingly, the cyberspace domain is contested…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA developing GPS backup and beyond Technologies for GPS denied and degraded environments

GPS0217 darpa adaptable navigation sensors graph

The GPS system provides critical positioning capabilities to military, civil, and commercial users around the world. The Global Positioning System (GPS), is a global navigation satellite system (GNSS) that provides location and time information in all weather conditions, anywhere on or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Industry preparing for Post Quantum or Quantum proof cryptography as Quantum computers threaten global communication digital infrastructure

symmetric asymmetric crypto diagramv2

Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, especially in an always connected, always online world. In addition, cryptography’s applications open up new opportunities and markets: digital signatures or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Militaries adopting rugged 5G enabled Notebooks, tablets and smart phones into tactical operations, however their vulnerability requires secure solutions

tablets

Military is increasingly looking to commercial ICT devices like Smartphones and tablets and they are rapidly making their way into military operations. Mobility continues to transform how the Department of Defense (DoD) operates, connects, and supports its stakeholders – most…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Photoacoustic Imaging enable Seeing Through Solids, hackproof Biometrics and Image Underwater Objects

photoacoustics

Alexander Graham Bell discovered photoacoustics by accident when he was working on the development of the photophone, a followup to his recently developed telephone that operated via modulated sunlight instead of electricity. You would operate a photophone by speaking into its…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s AMP to develop rapid, assuredly safe, and scalable software patches for reducing vulnerabilities of mission-critical systems

patch management process showing scan the network Slide01

Our society’s infrastructure is increasingly dependent on software deployed on a wide variety of computing devices other than commodity personal computers, such as industrial equipment, automobiles, and airplanes. Unlike commodity computers that have short upgrade cycles and are easily replaceable…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Large Biohacking or DIY biology growth, to hack human brains and their bodies, with desire to improve performance, cure chronic diseases and live longer

biohacking

Just as computers could be hacked and made to perform according to one’s wishes, now you hack your own body, a concept called Biohacking. It can be as simple as implementing lifestyle and dietary changes that improve the functioning of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Enhancing endpoint protection needs to be a top priority for civilian & military

endpointsecurity

Nation-states, organised crime, hacktivists and deliberate and unintentional insider attacks are at risk of organisations of all sizes. Endpoints such as mobile devices, desktops, laptops, and even medical and IoT devices are a popular attack vector, and the goal of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA OPS-5G to mitigate security threats facing 5G and future wireless networks in military appliations

OPS 5G.width 880

5G is the latest in a series of evolutions in public mobile networking, with widespread coverage and access on a subscription basis. 5G networks are characterized by improved capabilities across a variety of measures, including throughputs, latencies, numbers of devices,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here