Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

DARPA DPRIVE developing an ASIC for Fully homomorphic encryption (FHE) to ensure Data privacy and Security

Fully Homomorphic encryption

In the last few years, data privacy has become a hot-button issue globally, with high profile scandals and data leaks surrounding prominent companies like Facebook and Equifax resulting in greater privacy awareness among both consumers and businesses. On top of that,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Unleashing the Power of Drones: The Exponential Growth of the Global UAVs Market across Civil, Commercial, Military, and Security Sectors

Unmanned Aerial Vehicle UAV Payload and Subsystems Market 2019 2023

Introduction Unmanned Aerial Vehicles (UAVs), commonly known as drones, have revolutionized the aerospace industry. These aircraft, without a human pilot on board, have become integral components of unmanned aircraft systems (UAS), which encompass a UAV, a ground-based controller, and a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Harnessing Artificial Intelligence and Data Analytics to Combat Terrorism on Social Media: Promoting Cross-Platform and Transnational Cooperation

social media

In today’s digital age, social media platforms have become powerful tools for communication, information sharing, and social interaction. However, they have also become breeding grounds for extremist ideologies and terrorist propaganda. To counter this alarming trend, the integration of Artificial…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Protecting National Security: The Growing Market for Border Security Systems

Introduction: In an era of evolving global threats, safeguarding national security has become a top priority for governments around the world. As countries face challenges such as terrorism, transnational crime, smuggling, and illegal migration, the need for robust border security…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

India’s Smart and Comprehensive Integrated Border Management (CIBMS) to guard its long, difficult and porous borders

Security Challenges

The long, porous and difficult  borders have created the security challenges of illegal immigration, cross border terrorism, narcotics and arms smuggling, abetment of separatists and left -wing extremism and separatist movements aided by external powers. Pakistan policy of supporting cross…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

NATO cyber doctrine and command calls for enhancing Deterrence and cyber defense capabilities amid Russian and Chinese Cyber Warfare Threat

tumblr inline n9vvol6Olc1rpqqrk

The North Atlantic Treaty Organization is an alliance of European and North American countries formed after World War II as a bulwark against Russian aggression, as per The Associated Press. Its original members were Belgium, Canada, Denmark, France, Iceland, Italy,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber Resilience enables company to better prevent, quickly detect, contain, and recover from a cyberattack

Huntsman Cyber Resilience

This year has been largely dominated by the Russia-Ukraine war, with major concerns about its impact on the global threat level. Just three days after the invasion of Ukraine, on February 27th, Check Point Research (CPR) noted a 196% increase…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising Open Source Intelligence (OSINT) importance for Military

Intelligence, in military science, information concerning an enemy or an area. The term is also used for an agency that gathers such information. Military intelligence is as old as warfare itself. Even in biblical times, Moses sent spies to live with…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA HARDEN developing designs and tools for trusted computing systems

Hardware Trojans (HT), which are malicious circuit inclusions into the design from an adversary with an intention to damage the functionality of the chip at a much later date or leaking confidential information like keys used in cryptography. Time to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA CASTLE developing AI-toolkit for network hardening against advanced persistent threats (APT)

Computer networks are more than ever exposed to cyber threats of increasing frequency, complexity and sophistication. Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here