Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

DARPA’s PREEMPT to predict next pandemic due to Zoonotic Viruses like COVID-19 and plan proactive interventions

preparedness prediction and prevention of emerging zoonotic viruses with pandemic potential using multidisciplinary approaches sylvie van der werf 5 638

In recent weeks, concern over the emergence of a novel coronavirus in China has grown exponentially as media, experts and government officials around the world have openly worried that this new disease has the potential to develop into a global…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New radar imaging chips enable Through the wall imaging or Wall-penetrating radar on Android smartphones

TWIR

Security forces require effective ground ISR technologies that can overcome these challenges and provide effective situational awareness. One of the technologies useful in such situations is through-wall imaging which apply radio frequency (RF) and other sensing modes to penetrate wall…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

LIDAR proving to be a valuable sensor for Smarter space management, Infrastructure monitoring, Security and Disaster Response

lidarappliactions

Lidars (Light Detection and Ranging) are similar to radars in that they operate by sending light pulses to the targets and calculate distances by measuring the received time.  The  key advantages of  LIDAR is  its superior accuracy and its ability…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Commercialization of cybercrime leading to rising global threat of Cyber outsourcing or Cybercrime-as-a-Service

f5ddf7bd97d01d87f4a7985398aea709

Cybercrime is the greatest threat to every company in the world, and one of the biggest problems with mankind. Beyond a nefarious hobby, cybercrime has become a way for cybercriminals to earn a living. While it remains underground, it is…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Growing Threat of Non Lethal Weapons including Laser Dazzlers and Tasers employed by Military and Security to disorient, temporary blind or set to fire the adversaries

laserdazzler

Recently the Directed Energy Weapons (DEWs), especially laser DEWs are being developed as non lethal weapons. DEW is a system  that uses Directed Energy primarily as a means to incapacitate, damage, disable or destroy enemy equipment, facilities and/or personnel. Directed…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

NIST Cybersecurity Framework Improving Critical Infrastructure Cybersecurity by managing it’s cyber risks

NIST Cyber Framework

Cybersecurity Ventures predicts cybercrime will cost the world in excess of $6 trillion annually by 2021, up from $3 trillion in 2015. The NIST Framework for Improving Critical Infrastructure Cybersecurity, commonly referred to as the NIST Cybersecurity Framework (CSF), provides…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

With Cyber becoming operational domain of warfare, Militaries establish Cyber commands and develop offensive cyberwarfare capabilites

CybercommandMission

Cyber warfare has developed into a more sophisticated type of combat between countries, where you can destroy communications and other digital infrastructure of adversaries. Cyberwarfare involves digital attacks on the networks, systems and data of another state, with the aim of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Industry developing security solutions like Hardware security module (HSM) for secure military unmanned platforms, sensors, and communication devices

HardwareSecurityModule definition

Hardware Trojans (HT), which are malicious circuit inclusions into the design from an adversary with an intention to damage the functionality of the chip at a much later date or leaking confidential information like keys used in cryptography. Time to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Embedded eSIM and iSIM are breakthrough IoT connectivity technologies for authenticating subscribers and devices on mobile networks

iSim vs eSIM vs nanoSIM

Strong IoT device authentication is required to ensure connected devices on the IoT can be trusted to be what they purport to be. Consequently, each IoT device needs a unique identity that can be authenticated when the device attempts to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Growing Threat of Biohacking or DNA Malware with development of DNA based Biocomputers and memories

Recently biocomputers are  becoming feasible due to advancements in nanobiotechnology and Synthetic Biology. Biocomputers use systems of biologically derived molecules—such as DNA and proteins—to perform computational calculations. It is expected that the most significant advantage of the DNA chip will…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here