Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Departments of Defense developed Cloud-based biosurveillance ecosystem to warn of coming pandemics

BVSE

The threats of chemical, biological, radiological, nuclear and explosive (CBRNE) hazards continue to advance. CBRN weapons are some of the most indiscriminate and deadly weapons in existence today, with capability to affect large population in wide geographical area and in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Intelligence agencies prepare for post quantum world when current public key cryptology will be easily broken by quantum Computers

quantumcomputing

Modern cryptography being used extensively for securing our internet payments, banking transactions, emails and even phone conversations use cryptographic algorithms based on public-key encryption, which is considered to be secure against attacks from modern computers.   The development of quantum…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

MEOSAR, the Global Search and Rescue (SAR) service has become reality, could avoid accidents in sea,land, air, and now in space

97a787f8d6fb66aaef15fa858aa433ea

Search and Rescue (SAR) is receiving a lot of attention recently due to several high-profile incidents on land, in the air and at sea. Flight MH370 left Kuala Lumpur was bound for Beijing in March 2014 when it disappeared, with…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Why technology was unsuccessful in finding MH370 which disappeared in 2014, New mission to find MH370 is planned to be launched

mh370mozam 0

Flight MH370 left Kuala Lumpur was bound for Beijing in March 2014 when it disappeared, with 239 people on board. Even after the largest and most expensive search in aviation history, to date, neither any confirmed debris from the aircraft…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Quantum cascade laser (QCL) critical component for standoff chemical warfare agent detection and Direct Infrared Countermeasure (DIRCM) systems

QCl

The quantum cascade laser is a special kind of semiconductor laser, usually emitting in the mid- and long-wave infrared bands. Such a laser operates on laser transitions not between different electronic bands but on intersubband transitions of a semiconductor structure.  Their…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Blockchain & Cryptocurrency breakthroughs to transfer funds safely, quickly, anonymously and energy efficiently

cryptocurrency

As society become increasingly digital, financial services providers are looking to offer customers the same services to which they’re accustomed, but in a more efficient, secure, and cost effective way. Blockchain’s conceptual framework and underlying code is useful for a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Distributed optical fiber sensors (DOFS) are superb for infrastructure and earthquake monitoring

DOFSsensors scaled

The fiber optic sensors also called as optical fiber sensors use optical fiber or sensing element.  These Sensors can measure a large variety of parameters, such as temperature, pressure, strain, refractive index, vibrations, displacements, bending, loading, and liquid level or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Auxiliary ships for Afloat support sealift capacity is decisive in maintaining the wide spectre of current naval operations around the globe

Auxiliary ships are vital to maintaining a strong and efficient naval fleet. They are designed to perform multiple roles to effectively support combatant ships in and out of battle, as well as complete other similar naval operations. Although auxiliaries assist…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Nanotechnology based sensors for rapid, sensitive and reliable detection of explosives

sensors for detection 11 638

In recent years, spread of terrorism has assumed an alarming proportion across the globe, because of the simplicity and variety of schemes by which these explosive-based weapons can be deployed causing enormous damage to public safety and environmental pollution. This…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA GAPS program developing hardware and software architectures that can provide physical security like air-gaps

cb16 airgap security stateoftheart attacks analysis

Today, modern computing systems are incapable of creating sufficient security protections such that they can be trusted with the most sensitive data while simultaneously being exposed to untrusted data streams.” “Therefore, for the most sensitive computing systems, [the Department of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here