Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Threats of hacking of digital IDs, driving develpment of unbreakable Quantum EPUF IDs containing 1,000 trillion atoms

PUFauthentication

We live in digitised, connected societies, in an Internet of Things (IoT) world where our reliance on software, hardware, and the networks that connect us, grows exponentially. Our increasing global reliance on what we hope and assume are secure networks,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA CHARIOT developing Quantum proof cryptography for Military Mobile and IoT security

darpachariot

The exponential price/performance improvements in semiconductor technology stemming from Moore’s Law are enabling even the smallest and most application-specific devices, such as sensors and actuators, to include networking capabilities. The overwhelming majority of such devices will be cheap and power-constrained.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber Security Situational Awareness tools on Defense Platform Networks are critical for Cyber Warfare

situation awareness1

Cyberspace is understood as the fifth domain of warfare equally critical to military operations as land, sea, air, and space. Success of military operations in the physical domains is increasingly dependent on the availability of, and access to, cyberspace. The…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA HACCS employing AI for cybersecurity by developing autonomous software agents, that will infiltrate adversary’s networks, detect botnets and neutralize them

Defense research unit neutralize botnets

As the complexity of software is growing software vulnerabilites are also increasing. According to two US based organizations that track vulnerability disclosure, the number of software vulnerabilities has gradually grown year-over-year achieving its highest peak in 2017. Computers are not…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Next generation non-lethal weapons being developed with ehnaced capability, longer range and lower risk of injury

nonlethalweapons

The United States armed forces expect to encounter a variety of military operations in the future that are unconventional in nature. Known as Military Operations Other Than War (MOOTW) they include such things as peacekeeping, humanitarian relief, covert operations, and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

COVID-19 is enhancing Terrorism, Cyberattacks, and Bioterrorism threats in the world

Covidcyber

The head of the World Health Organization is warning that the COVID-19 pandemic is speeding up, and he criticized governments that have failed to establish reliable contact tracing to stop the spread of the coronavirus. According to the latest tally…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Under Cyber Warfare threat from China and Pakistan, India steps up cyber security measures and operationalising its Cyber Command

cyber war a threat to indias homeland security 2015 35 638

Cyber warfare has developed into a more sophisticated type of combat between countries, where you can destroy critical infrastructure such as power, telecommunications or banking by damaging the computer systems that control those infrastructures. It’s widely acknowledged that offensive cyberattacks…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s AISS program to develop tools for automatic design of secured System on Chip (SoC) for Military IoT

AISS

A system on a chip or system on chip (SoC) is an integrated circuit (also known as a “chip”) that integrates all components of a computer or other electronic system on a single circuit die. Similar to how a microcontroller…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries developing Hybrid UAS/UGV delivering goods and for rescue missions intelligent transportation systems in smart cities.

hybriduavugv

There could be no smart city without a reliable and efficient transportation system. This necessity makes the ITS a key component of any smart city concept. While legacy ITS technologies are deployed worldwide in smart cities, enabling the next generation…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Internet becoming secure and faster through QUIC, the new transport protocol set to replace TCP and HTTP/3

http2 stack vs http3 stack

As the Military and civilian technological systems, from fighter aircraft to networked household appliances, are becoming ever more dependent upon internet, they are also becoming more vulnerable to hackers  and electronic intruders. Electronic system security has become an increasingly critical…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here