Category Cyber & Information Warfare

DARPA GAPS program developing hardware and software architectures that can provide physical security like air-gaps

cb16 airgap security stateoftheart attacks analysis

Today, modern computing systems are incapable of creating sufficient security protections such that they can be trusted with the most sensitive data while simultaneously being exposed to untrusted data streams.” “Therefore, for the most sensitive computing systems, [the Department of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Militaries developing Cyber Testbeds to test and validate strategies, tactics and security measures for Cyber Warfare

cybertestbed

All over the world Cyber attacks are becoming increasing in number and sophistication. Many organizations in Europe and the US have been crippled by a ransomware attack such as “Petya” ,  WannaCry or WannaCrypt ransomware attack affected more than 230,000…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries race to employ Blockchain, the virtual currencies technology, for tamper-proof military systems and cybersecurity

blockchain

Blockchain is a transformative technology for the two billion people in the world currently underserved by financial institutions. The technology has the potential to enhance privacy, security and freedom of conveyance of data. Blockchain is based on open, global infrastructure,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Supercomputers can assist in Cyber Security by Identifying threats, detecting anomalous behaviour and finding software vulnerabilities

Threats 1000x600 3

Supercomputers have  become essential for National Security, for decoding encrypted messages, simulating complex ballistics models, nuclear weapon detonations and other WMD, developing new kinds of stealth technology, and cyber defence/ attack simulation. Because of the expense, supercomputers are typically used…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Industry developed new approach to protect against advanced ‘ROP’ Cyberattacks

ROP

Today’s cybersecurity playing field is fundamentally asymmetric. Attackers are easily able to identify weaknesses in a target system once they have access to its code and configuration. As a result, defenders are perpetually playing a game of catch-up to secure…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber risks of Video-conferencing apps like Zoom, popular with professionals working from home globally

zoom app

Video conferencing apps like Zoom have become popular with professionals working from home globally, who are using it for virtual meetings, presentations and calls.  Millions of people have turned to the app as they work and study from home amid…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

High-assurance Network encryptors secure voice, video, and data moving over public and private IP networks

network encryption for financial services 29 638

Protecting network transmitted data against cyber attacks and data breaches is imperative for government agencies. Data network eavesdropping, innocent error or technical failure, data tampering and data theft have all become commonplace. The implications of a significant breach are often…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Global threat Intelligence and warnings shared by Cyber Agencies enables mitigating cyber threats before large scale exploitation by hackers

cybersharing

According to the World Economic Forum’s 2016 Global Risks Report, cyber-security is recognised as one of the greatest threats to business worldwide, and the global cost of crimes in cyberspace is estimated to be $445bn. By 2021, cybercrime damage is…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber attacks as big a threat to warships as missiles and torpedoes, Navies develop cyber security policy and risk management

Navycyber

The maritime sector is on the verge of a digital disruption. As digital transformation of the maritime sector is gathering momentum that will have a major impact on operations and existing business models, simultaneously the threat cyber attacks is emerging.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Emerging AI and machine learning based cyber security deception technology includes cyber traps and decoys.

deception

The number of threats organizations face continues to go up. Attacks grow more sophisticated and target more widely. Current security tools are very good at flagging up anomalies but not so good at defining their impact and risk potential. The…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here