Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Artificial Intelligence and Machine Learning are enabling the future of fully automated Cyber Security

artificial intelligence and machine learning for cybersecurity 15 638

AI emulates human cognition – i.e. learning based on experience and patterns, rather than by inference (cause and effect). Artificial intelligence covers everything from machine learning to business intelligence. Machine learning is a branch of artificial intelligence (AI) that refers…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DOD looks to secure Content delivery Network (CDN) services to stream its mission-critical and sensitive information

CDN

A Content Delivery Network (CDN) is a globally distributed network of web servers or Points of Presence (PoP) whose purpose is to provide faster content delivery. The content is replicated and stored throughout the CDN so the user can access…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

High Frequency Surface Wave Radars (HFSWR) for Ship detection and tracking far beyond the horizon

HFSWR

In recent years organized crime in maritime regions has flourished, threatening both secure flow of goods from Exclusive Economic Zones (EEZ)  and lives of participants in the marine operations. Security threats and humanitarian risks caused by trafficking (drugs, weapons, etc.),…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

USAF Agile Cyber Technology 3 (ACT 3) to develop enabling technologies to achieve cyber superiority.

Cyberspace is essential to all Air Force (AF) missions. It is a domain in which, from which, and through which AF missions are performed. Actions in cyberspace can have digital, kinetic, and human effects. Increasingly, the cyberspace domain is contested…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA developing GPS backup and beyond Technologies for GPS denied and degraded environments

GPS0217 darpa adaptable navigation sensors graph

The GPS system provides critical positioning capabilities to military, civil, and commercial users around the world. The Global Positioning System (GPS), is a global navigation satellite system (GNSS) that provides location and time information in all weather conditions, anywhere on or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries advance Border management Strategy and technology to counter terrorists, and criminals, smuggling weapons, and illegal drugs, and counterfeit goods

Borderthreat

In an increasingly globalised and interconnected world it has become simple for people and goods to cross borders and so for terrorists. America’s borders and ports are busy places, with tens of millions of cargo containers and hundreds of millions…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Threat of Radiological warfare, Radiological weapons and Dirty Bombs

RadiologicalWeaponsThemainradiologicalweaponisthe‘DirtyBomb’

The threats of chemical, biological, radiological, nuclear and explosive (CBRNE) hazards continue to advance. CBRN weapons are some of the most indiscriminate and deadly weapons in existence today, with capability to affect large population in wide geographical area and in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Industry preparing for Post Quantum or Quantum proof cryptography as Quantum computers threaten global communication digital infrastructure

symmetric asymmetric crypto diagramv2

Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, especially in an always connected, always online world. In addition, cryptography’s applications open up new opportunities and markets: digital signatures or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Militaries adopting rugged 5G enabled Notebooks, tablets and smart phones into tactical operations, however their vulnerability requires secure solutions

tablets

Military is increasingly looking to commercial ICT devices like Smartphones and tablets and they are rapidly making their way into military operations. Mobility continues to transform how the Department of Defense (DoD) operates, connects, and supports its stakeholders – most…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Photoacoustic Imaging enable Seeing Through Solids, hackproof Biometrics and Image Underwater Objects

photoacoustics

Alexander Graham Bell discovered photoacoustics by accident when he was working on the development of the photophone, a followup to his recently developed telephone that operated via modulated sunlight instead of electricity. You would operate a photophone by speaking into its…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here