Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

IARPA pursues anticipatory intelligence to predict the unpredictable , Video to open source collection & analysis to Quantum amd Exascale computing

IARPA

The Intelligence Advanced Research Projects Activity (IARPA) is an organization within the Office of the Director of National Intelligence that funds high-risk, high-payoff research to overcome difficult challenges relevant to the United States Intelligence Community. IARPA was given the mandate…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Quantum cryptography vulnerable to hacking too, Researchers developing hackerproof MDI QKD schemes to enhance network encryption

quantum computers quantum key distribution quantum networks 39 638

With the age of quantum computing drawing ever-closer, traditional encryption methods are at risk. While brute force attacks can take months to break through security, quantum attacks can use more advanced techniques to break standard public key cryptography in a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Navies developing cyber security measures and cyber defense technologies to counter growing cyber threats

HolisticEnterpriseApproachtoCybersecurity

Ships are increasingly using systems that rely on digitization, integration, and automation. Offensive actors understand the naval reliance on communications, ISR, and visualization technologies, and perceive them as vulnerable to disruption and exploitation. In 2016, the Baltic and International Maritime Council (BIMCO) in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Multi-factor authentication has become essential to protect accounts in commercial and military

MFA 1

The traditional, not so secure way to log in to your bank account: enter your username and that familiar password you probably use for most of your online accounts. Then, you’re in. You can go about your business. If you’re…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Australia facing cyber attacks by sophisticated state-based cyber actor, implementing Cyber Vision 2020, cyber security strategy, cyber science and technology plan

6c16f95e5837b7a15cc22a32eb72fad8

The exponential growth of information and communications technology (ICT) technology that includes Internet, telecommunications networks, computer systems, and embedded processors and controllers, has led to creation of Cyberspace, a global domain within ICT. The economic, social and strategic influence is…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Industry launch transparent, persistent and pervasive encryption solutions to prevent data breaches

z14 pervasive encryption

Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Data centers are attractive, lucrative targets for cyber criminals and nation-states, require security meaures & technologies

cybersecuritydatacenter

Today, majority of organizations and many government departments and agencies have shifted their databases onto the cloud to improve efficiency and productivity of resources as well as bring down costs. Unfortunately, this move has exposed sensitive information to hackers, who…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New efficient, high brightness, and tunable Quantum cascade laser (QCL)s technologes from mid-wave infrared (MWIR) to Terahertz region promise chemical warfare agents & hidden explosives detectors, to infrared countermeasure (IRCM) systems

QCLtech

Compact, chip-based lasers have conquered much of the electromagnetic spectrum, from ultraviolet to infrared, enabling technologies from digital communications and barcode readers to laser pointers and printers. Diode lasers depend on the process of electron-hole recombination: an electron from the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Indian Threat Scenario, National security threats and future military capability requirements

multidomainmilitary

There are two approaches to connect Warfighting and emerging technologies. One is to consider the present and future threat environment and then through system analysis we can identify technologies required to mitigate those threats. Secondly, we can identify the emerging…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Remerging threat of Biological Weapons attack against Agricultural Targets and Agrobioterrorism, with advances in Gene editing, synthetic biology, and improved delivery systems

agriculturewarfare

Food and agriculture are key elements of the critical infrastructure of every country because they provide products that are essential for life. The United States is a country with a highly developed agricultural sector. Food and agriculture constitute a sixth…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here