Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Emerging Technologies, their impact on War fighting and Military technology requirements

militarytech

This century has seen rapid growth in new technologies such as 5G, AI, cloud computing, nanotechnology, biotechnology, smartphones, cryptocurrency, augmented reality, gene editing, social media platforms…and quantum. This is a perfect example of the Law of Accelerating Returns posited by…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Brain-computer interfaces (BCI) are vulnerable to cyber attacks and need security and safety measures

Privacy threats 4

Brain-Computer Interfaces (BCIs) are bidirectional devices that allow communication between the brain and external systems, such as computers. Every action our body performs begins with a thought, and with every thought comes an electrical signal. The electrical signals can be…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA GECCO develop hackproof Military 5G communications

The New York Times reported  that the US government has defined 5G competition as a “new arms race.” According to the report, “whichever country dominates 5G will gain an economic, intelligence and military edge for much of this century.” The…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Aircrafts employing Directed InfraRed CounterMeasure (DIRCM) to counter threat of Manpads, the shoulder-fired anti-aircraft missiles

countemanpads

The West in its continuous support to Ukraine has been supplying the besieged country with military aid in the form of arms as well as anti-aircraft and anti-tank defence systems. Joe Biden said the US will be sending an additional…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Facial recognition widely employed in commercial, Security and Military applications

facial recognition technology

Facial recognition is a way of using software to determine the similarity between two face images in order to evaluate a claim. The technology is used for a variety of purposes, from signing a user into their phone to searching…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber Threats Targeting Food and Agriculture Sector (FA) and Cyber Security

Throughout much of the world, food and beverage safety and security is a high priority. Concomitantly, the economics, societal robustness, and security implications of agriculture, foodstuffs and beverages are massive. Extensive quality measures are in place to prevent and mitigate…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

High Value Targeting (HVT) Against Insurgents and Terrorists

A high-payoff target, also known as an HPT, is a high-value target whose loss to the enemy will significantly contribute to the success of a friendly course of action. Also called HVT, the loss of high-value targets would be  expected to seriously degrade important enemy functions throughout the friendly commander’s area of interest.   The term has been widely…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

With Rising threat in Space domain from Electronic to Cyber Warfare, Space agencies enhancing Cyber security measures

satellitehacking

Space is increasing becoming another domain of conflict due to enhanced militarisation i.e. utilisation of space systems by defence forces to support military operations as well as space  weaponization with the proliferation of counter-space weapons. There are a variety of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber Warfare threat driving Defense Cyber Security market and new security technologies

cybersecurity market

In 2019, 1,473 data breaches in the U.S. led to the exposure of 164,683,455 confidential records, as per the Identity Theft Resource Center (ITRC). Additionally, in May 2020 alone, 841,529 records were exposed in 108 data breach incidents. The records…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Facial recognition is advancing to Emotion recognition

emotionrecog

Facial recognition is a category of biometric software that maps an individual’s facial features mathematically and stores the data as a faceprint. The software uses deep learning algorithms to compare a live capture or digital image to the stored faceprint…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here