Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

US Military, the world’s largest polluter is implementing energy security strategy reducing future resource risk and increasing mission assurance

energysecurity

In the domain of defense, energy has the potential to be both an enabler of hard power but also, via denial, arguably itself to be a weapon of war. Energy enables nearly everything the military does, and the primary objective…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Army’s NGIA integrating multiple domain sensors for situational awareness

Multi domain graphic

The United States Special Operations Command (USSOCOM or SOCOM) is the Unified Combatant Command charged with overseeing the various Special Operations Component Commands of the Army, Marine Corps, Navy, and Air Force of the United States Armed Forces. USSOCOM conducts…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

GPS III and NTS-3 Satellites will provide higher acccuracy, jam resistance, and new navigation warfare (NAVWAR) capabilities to US DOD

GPS IIIF Program

The Global Positioning System (GPS), is a global navigation satellite system (GNSS) that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Civil Rights protection on Social Media through Human rights-based AI/Machine Learning

Security is the state of being free from threat. To mitigate the threat, we require technology. The technology uses scientific knowledge in the form of new processes, materials, devices, systems or tools. For all of us, most important is human security…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber Security of Industrial control systems (ICS) and SCADA systems

ICS

Industrial control system (ICS) is a collective term used to describe different types of control systems and associated instrumentation, which include the devices, systems, networks, and controls used to operate and/or automate industrial processes. Depending on the industry, each ICS…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Internet evolving from Globally conscious entity to consciousness of its own

idea ESSAY med FINAL PYRAMID

In the last 30 years, the internet has become the main interface for publishing, accessing, and sharing information.  Access to the internet can provide an instant connection between any two conscious human minds almost anywhere on the planet. Smartphones and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Mobile security

mobilesecurity

The future of computers and communication lies with mobile devices, such as laptops, tablets and smartphones with desktop-computer capabilities. Their size, operating systems, applications and processing power make them ideal to use from any place with an internet connection. And…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Tethered Drones or UAS, Hovering platforms, and Towed parafoil system provide long range Communications and Surveillance for Combatting terrorism

5fa21cd9e0d2531a2f1dfdffbab46f70

Militaries have long recognized the  advantages of height for surveillance platforms to overcome the Horizon limitations because of curvature of earth, therefore it has been using many such platforms like baloons, and aerostats. Security forces have also found that countering…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyberbiosecurity threats, vulnerabilites and cyberbiosecurity technologies

cyberbiosecurity

The life sciences now interface broadly with information technology (IT) through its industrial applications in health care, agriculture, manufacturing, automation, artificial intelligence, and synthetic biology. The information moves between living and cyber systems in a two-way flow.   Global public…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Growing Cyber threats to commercial aviation require cyber risk management, and resilient systems

cyber security in transportation 9 638

Cyber attacks are growing in number and sophistication affecting large corporations, critical infrastructures of all kinds, governments to SMEs, and increasingly the aviation industry.   Commercial aviation plays a central role in our daily lives and is an essential part…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here