Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Dark Web which hides illicit activities like buying and selling drugs, guns, and hacked data is now under Global Crackdown

The Dark Web and how to access it blackMORE Ops 6

The internet is actually made up of three different layers: the surface web, the deep web and the dark web. The top layer, the surface web, are web pages that show up using search engines such as Google. The deep…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Defense Threat Reduction Agency (DTRA) thrust on technologies to protect military troops from chemical weapons

bioscavengers

Nerve agents, a class of synthetic phosphorous-containing compounds, are among the most toxic substances known. Brief exposure to the most potent variants can lead to death within minutes. Once nerve agents enter the body, they irreversibly inhibit a vitally important…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New technologies to aid Ocean search and rescue operations

SARoceans

Search and rescue (SAR) is the search for and provision of aid to people who are in distress or imminent danger. The general field of search and rescue includes many specialty sub-fields, typically determined by the type of terrain the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Covid-19 is accelerating the transition to smart and safe cities with technology to build resilience

smartcities

Cities are powerful engines of economic growth, , more than half of the world’s population lives in an urban area or city and it is estimated 70 per cent of the world’s population will live in cities by 2050.  Urbanization’s…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Software is becoming more vulnerable to cyber attacks, CVE identifies common vulnerabilities exploited by state and nonstate actors

vulnerabilites

In computer security, a vulnerability is a flaw or weakness in a system or network that could be exploited by a threat actor, such as an attacker, to manipulate or cause damage to the system in some way.  To exploit a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Changing nature Of Irregular Warfare require new capabilites and technologies

Emerging technologie

Traditional warfare is characterized as “a violent struggle for domination between nation-states or coalitions and alliances of nation-states. ” This confrontation typically involves force-on-force military operations in which adversaries employ a variety of conventional military capabilities against each other in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Defence and Security Accelerator (DASA)’s Predictive Cyber Analytics Competition to develop proactive defence in a hostile and contested cyber environment.

DASA

Computing infrastructure is a key component of nearly all modern defence systems and providthroughes another attack surface for adversaries. Cyber security has been in an arms race for decades, with hackers continuously exposing new vulnerabilities and developers racing to patch…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s SIEVE project developing zero-knowledge proofs for demonstration of DoD capabilities particularly cybersecurity and cyberspace operations without revealing sensitive details

zeroknowled

There are times when the highest levels of privacy and security are required to protect a piece of information, but there is still a need to prove the information’s existence and accuracy. For the Department of Defense (DoD), the proof…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SIGMA deployed city wide Internet of Things (IoT) network to provide real time situational awareness of CBRNE threats

darpasigma 1

Since the invention of nuclear power, there have been numerous “accidents.” From Three Mile Island and Chernobyl to the more recent problems in Fukushima, it would seem nuclear power is not fully under our control. Recently  a Chinese scientist  has…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s Cyber Assured Systems Engineering (CASE) developing tools for designing embedded computing systems tolerant to cyberattacks

electronicdesign 8621 microsemi promo

Embedded computers can be found in places such as smart home appliances, medical gear, cars, and even facilities such as power plants. And they run software that can be exploited just like any computer, warmed Ang Cui, founder and CEO…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here