Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Compact Electronic noses can monitor air quality, diagnoze diseases to biohazards like covid-19, explosives and nerve gas

electronic nose concept

Government and local law enforcement agencies have employed canines for decades to sniff  explosives and such banned goods as fresh produce, exotic wildlife, undeclared currency and illicit drugs.   Now researchers are developing electronic noses imitating the sense of smell of humans…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising Maritime threats require Smart Ports, Ship security and safety technologies to improve security and stability of maritime domain

maritimesecurity

The oceans are vital to the overall growth of the world economy and population, and to the continued economic integration of nations. The oceans are a primary source of food, energy, and transportation, all key requirements of human activity in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s AMP to develop rapid, assuredly safe, and scalable software patches for reducing vulnerabilities of mission-critical systems

patch management process showing scan the network Slide01

Our society’s infrastructure is increasingly dependent on software deployed on a wide variety of computing devices other than commodity personal computers, such as industrial equipment, automobiles, and airplanes. Unlike commodity computers that have short upgrade cycles and are easily replaceable…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Large Biohacking or DIY biology growth, to hack human brains and their bodies, with desire to improve performance, cure chronic diseases and live longer

biohacking

Just as computers could be hacked and made to perform according to one’s wishes, now you hack your own body, a concept called Biohacking. It can be as simple as implementing lifestyle and dietary changes that improve the functioning of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Drones that can Autonomously launch and Land from a moving platform are new requirements for Defense and Security

dronemovvehicle

An unmanned aerial vehicle (UAV) ( commonly known as a drone) is an aircraft without a human pilot on board. UAVs are a component of an unmanned aircraft system (UAS); which include a UAV, a ground-based controller, and a system…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Fire safety of High-rise buildings several unique challenges require new solutions and technologies

firesafety

The World Trade Center events of September 11, 2001, focused the world’s attention on high-rise buildings. Since that time, there have been several other events that have kept the world’s attention on high-rise building fire safety, including fires in Madrid,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Enhancing endpoint protection needs to be a top priority for civilian & military

endpointsecurity

Nation-states, organised crime, hacktivists and deliberate and unintentional insider attacks are at risk of organisations of all sizes. Endpoints such as mobile devices, desktops, laptops, and even medical and IoT devices are a popular attack vector, and the goal of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

France thrust on counter terrorism initiatives after glaring security gaps exposed by brazen attacks

french

France suffered a series of deadly terror attacks in November 2015. In 2015, the brazen murders of 17 innocent people, in three separate attacks in as many days, have revealed serious breaches and lapses in the French system of intelligence,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Changing role of Military Scientific and Technical Intelligence ( S&TI)

If the Militaries are to fight and win in future wars, it must thoroughly understand the challenges that it will face and how those challenges will impact the way it intends to fight. It must act now to ensure that…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA OPS-5G to mitigate security threats facing 5G and future wireless networks in military appliations

OPS 5G.width 880

5G is the latest in a series of evolutions in public mobile networking, with widespread coverage and access on a subscription basis. 5G networks are characterized by improved capabilities across a variety of measures, including throughputs, latencies, numbers of devices,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here