Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Smart Home Security Threats , countermeasures and Technology solutions and their Market growth

FBI has reported recent crime data: 7.9 million property crimes were committed in the nation in 2015. Property crimes resulted in losses estimated at $14.3 billion in 2015. Property crime rates have steadily declined over the last ten years. In…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Synthetic Biology has enhanced asymmetric Bio warfare and Bio terrorism threat posed by biological weapons, in response US launches Biodefence Strategy

bioterrorism 2 728

The COVID-19 pandemic has demonstrated that significant biological threats can and will emerge from nature without warning, demonstrating that a single viral strain can have a profound impact on modern society. It has also demonstrated that infectious diseases can rapidly…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising security threats to Smart homes their security requirements and measures for protection

smarthomesecurity

A smart home refers to a convenient home setup where appliances and devices can be automatically controlled remotely from anywhere with an internet connection using a mobile or other networked device. Devices in a smart home are interconnected through the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Terahertz Photonics breakthroughs promise ultrahigh speed communication systems to medical imaging and diagnostics, industrial quality control, and security screening

terahertzphotonics

Terahertz (THz, 1012 Hz) technology is based on light sources with frequencies much lower than of visible light, and slightly higher than of microwaves. Such light sources have a number of unique capabilities, for example that it can propagate through…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Smart home devices have many security risks and threats to be exploited by hackers and Intelligence agencies for mass surveillance

IoTsurveiilance

The rise of the digital era has brought with it many wondrous changes to our daily lives, not least of which the fact that we now carry digital assistants with us everywhere we go in the form of smartphones, tablets,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Driverless cars vulnerable to hacking and could be used to carry out suicide attacks, Researchers developing new security solutions

Car Bomb

Automotive industry is currently undergoing an electrification process. In a few years, every new vehicle sold will have some degree of autonomy built in. Carmakers from Google to Apple, Tesla to Volkswagen are trying to make drivers obsolete, handing control of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US, Israel and India require new Tunnel Detection and neutralization technologies to stop drug and weapon smuggling, human trafficking, and cross border terrorism

7acce66d40ec90c2d61987b409cbf850 L 1

Criminals, terrorists and military have been using  tunnels since long time to evade detection as surface based detection methods are ineffective underground .   Indian Border Security Force (BSF) troopers in Nov 2020 discovered an underground tunnel on the international…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

After initial Hype and amid Cyber Warfare threat, Network Centric Warfare approach is now being adopted realistically in various Militaries

NCW

As the 21st Century battlefield becomes increasingly complex and asymmetrical, military forces are striving to harness network technology to gain an operational advantage, by transforming traditional linear command structures and linking sensors, unmanned vehicles, command posts and ground troops to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Corona virus or COVID-19 widely impacted World’s economy, geopolitics, military to technology and industry

coronavirusworldmap fordigest march31

More than 248 million people have been reported to be infected by the novel coronavirus globally and 5 million have died, according to a Reuters tally.   From herpes and legionnaires’ disease in the 1970s, to AIDS, Ebola, the severe…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA GRIT program developing compact, tunable Gamma ray source for advanced accelerator technology, high-energy laser systems, and new x-ray and gamma ray detectors

GRIT image 01

Gamma rays are ionizing electromagnetic radiation, obtained by the decay of an atomic nucleus. Gamma rays are given off by stars, and by some radioactive substances. Gamma-rays travel to us across vast distances of the universe, only to be absorbed by…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here