Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Armed Crop Dusters for Security and Military Missions

A crop duster, is usually, an aircraft used for dusting or spraying large acreages with pesticides. Aerial spraying and dusting permit prompt coverage of large areas at the moment when the application of pesticide is most effective and avoid the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SMOKE to automate cyber red teaming or penetration testing to uncover military systems vulnerabilites

DARPASMOKE

Cyberattacks are being conducted daily on any type of target, and any notion that a state of full cyber security can be reached is a mere illusion. Cybersecurity is about managing risks and to ascertain that, to a certain extent,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

China controls internet to curb dissent , employs widespread surveillance for ‘anti-terror’ measures and for repression of people

terroristsChina

With President Xi Jinping at the helm, the Chinese government doubled down on repression inside and outside the country in 2021, says world report 2022 on human rights. Its “zero-tolerance” policy towards Covid-19 strengthened the authorities’ hand, as they imposed…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countering Foreign Interference and Knowledge security

State actors use a variety of methods to acquire knowledge and technology that they can use for military purposes or for objectives that are not consistent with our fundamental values. Examples include centrally controlled talent programmes, applying pressure to compatriots…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Telecommunications is a critical infrastructure and needs to be protected from ever increasing cyber threats

cybertelecom

Cyber-attacks are continuously growing in size and breadth, targeting organizations of all sizes across sectors, and telecom sector is no exception. According to PwC’s Global State of Information Security, 2016, IT security incidents in the telecoms sector increased 45% in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA devloping tool to assess Risks of Crypto to National Security

Blockchain, bitcoin, crypto assets, and virtual currencies have become a whole new vocabulary describing innovative technology to swiftly transfer value around the world. Blockchain originated just over 10 years ago. Since then, virtual assets have become widely available and have…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Voilent Extremist attacks on Critical Infrastructure and protection

Infrastructure protection

Critical infrastructure comprises facilities and assets that are essential for the normal functioning of day-to-day life within a country and range from energy and transportation to agriculture and public health.   Extremists tend to view critical infrastructure as an attractive…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

European Union (EU) cyber security and EDA cyber defence strategy calls for proactive and reactive cyber defence technology and Cyber Situation Awareness (CySA) operational capability.

european priorities in information security 5 638

The pandemic, which moved citizens’ lives into the digital sphere, saw a rise in security breaches within European businesses and institutions. Cyber attacks against key European sectors doubled in 2020. Significant malicious attacks against key sectors doubled in Europe –…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA MICEE to monitor and detect malicious activities in 5G/mobile infrastructure devices.

The New York Times reported  that the US government has defined 5G competition as a “new arms race.” According to the report, “whichever country dominates 5G will gain an economic, intelligence and military edge for much of this century.” The…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA EVADE to improve the cybersecurity of Military IoT/embedded devices

By 2025, it is predicted that there can be as many as 100 billion connected IoT devices or network of everyday objects as well as sensors that will be infused with intelligence and computing capability.  These devices shall comprise of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here