Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

DARPA EA developed tools for timely, accurate threat information and Attribution of Malicious Cyber Actors like Russia and China

enhanced attribution darpa

Malicious actors in cyberspace currently operate with little fear of being caught due to the fact that it is extremely difficult, in some cases perhaps even impossible, to reliably and confidently attribute actions in cyberspace to individuals. The reason cyber…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Critical communications broadband capabilities

critical communications

Public safety organizations and many other professionals need to communicate when coordinating operations and tasks.  Critical Communication is essential to react and respond effectively and at the core of the functioning of emergency services. Critical communications include mobile, radio telecommunication systems…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Quantum enhanced LIDAR will help reduce environmentally damaging methane leaks from the oil and gas industry

Quantum enhanced LIDAR

In purely economic terms, methane leaks from well-heads and pipelines cost the oil and gas industry between $6bn and $30bn a year. In the US, methane leaks from the natural gas and petroleum industry are now the number one source…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Growing cyber attacks require Organization Incident response plan

The accelerating pace of digitalisation, fuelled by the COVID-19 pandemic, has led to a record-breaking year for cybercrime with ransomware attacks rising 151 per cent in 2021, and an average of 270 cyberattacks per organisation being faced, a new study…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Critical Infrastructure Protection Market

Networked technologies touch every corner of the globe and every facet of human life. They have driven innovation, nurtured freedoms, and spurred economic prosperity. Even so, the very technologies that enable these benefits offer new opportunities for malicious and unwanted…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA HACMS employed Formal Verification Methods to develop hack proof unmanned vehicles , weapons , satellites, and command and control systems

542390225756f78888142d54f3d17e01

In 2011, Iran claimed to have downed a sophisticated American stealth drone, and unveiled what it alleged was a reverse-engineered copy of the futuristic looking RQ-170 Sentinel UAV, produced by defense giant Lockheed Martin. The drone was brought down by…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Ion beam accelerator for nuclear device characterization, detection of contraband materials, and Directed energy weapons

Ionbeamaccelerator

Ion beam accelerators are machines providing kinetic energy to charged particles called ions, which bombard the target sample – the material to be irradiated and subsequently analyzed. The target can be a thin foil or a piece of mineral, rubber,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

UK Cyber Security Strategy emphasizes Defence , Deterrence and Cyber technology development

The rapid development of digitalized services and online shopping in the UK has been paralleled with significant growth in cybercrime, leading to greater spending on security in public and private sectors. Organizations’ IT footprints have also become increasingly complex, driving…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

5G Mobile Networks deployments have many security and privacy threats, Require New policies and technologies including quantum cryptography

5g security

Countries are now racing to deploy 5G, short for 5th generation mobile networking or 5th generation wireless systems. The Fifth Generation (5G) mobile networks  promise fast Internet for everyone, smart cities, driverless cars, critical health care, “internet of things” revolution,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA ‘s PROTEUS urban combat software allows Marine commanders to explore and develop new multidomain fighting concepts

Cities have become the new battleground and Hybrid or Urban Warfare the greatest threat being waged by ISIS to Boko Haram to Hamas to Ukraine rebels.  Urban warfare is fundamentally unchanged since World War I in many regards: battle is…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here