Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Rising Threats of data breaches requires new Data loss prevention (DLP) solutions and technologies

DLP

More data is being generated each year than in the whole of re­corded human history, yet data security hasn’t kept up. Further, the IoT is growing at such a rapid rate, companies have a huge influx of data to comprehend.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber threats to critical Infrastructure (CII) require Effective Cyber Incident Response plan at National level

incident response planning

Networked technologies touch every corner of the globe and every facet of human life. They have driven innovation, nurtured freedoms, and spurred economic prosperity. Even so, the very technologies that enable these benefits offer new opportunities for malicious and unwanted…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Homeland security threats and Counter Terror & Public Safety Technology Market

countetterrorism

Today’s terrorist landscape is more fluid and complex than ever influenced by economic and social conditions that breed extremism and the threat landscape is less predictable. The Countries face an increasingly complex terrorist landscape, populated by a diverse array of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s SAHARA to automate Structured ASICs production and enhance their security for defense electronic systems

SAHARA ASIC technology.original

Time to market demand has forced integrated circuit design, manufacturing and testing to be done at different places across globe. This approach has led to numerous security concerns like overbuilding of chips from foundries, IP protection, counterfeiting and hardware Trojans.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Non-Line-of-Sight Imaging can be transformative in medicine, robotics, manufacturing, and security

NLOS

We see things because our eyes are sophisticated light detectors: they constantly capture the light rays bouncing off nearby objects so our brain can construct an ever-changing impression of the world around us. Similarly in  a camera, All the light…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber attacks on Port facilities can cause disruptions to Shipping operations

Port Facility Security

Maritime networks have become an attractive playground for hackers, with cyber-attacks on vessel OT networks and systems increasing by 900% over the past three years.  A ship’s onboard information technology and operational technology systems can be hacked just as easily…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Health impacts of Radionuclides in Drinking Water and technology solutions to remove them

radionucleitide

Radionuclides are types of atoms that are radioactive. The most common radionuclides in drinking water are radium, radon and uranium. Radionuclides occur naturally as trace elements in rocks and soils as a consequence of the “radioactive decay” of uranium-238 (U-238)…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New Physical and behavioral Biometrics technologies with increased accuracy and security being developed

biometrics 5 638

Identity theft is increasingly a 21st-Century problem. As more data moves off of physical paper and onto Internet-connected servers, the chances of that data getting stolen increases as well. According to the FTC, there were 2.8 million fraud reports from…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New Airport Security technology breakthroughs combatting increasingly complex threat environment

terrorist attack 502762

Commercial aviation plays a central role in our daily lives and is an essential part of the national economy. More than 100,000 flights take off and land every day across the world. More than billion passengers go by air every…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising DNS attacks require DNS security measures and Protective DNS says Joint NSA and CISA Guidance

DNS spoofing

The Domain Name System (DNS) is central to the operation of modern networks, translating human-readable domain names into machine-usable Internet Protocol (IP) addresses. Email services, chat services and even social networks rely on DNS to work 24 hours a day,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here