Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Militaries developing Cyber Testbeds to test and validate strategies, tactics and security measures for Cyber Warfare

cybertestbed

All over the world Cyber attacks are becoming increasing in number and sophistication. Many organizations in Europe and the US have been crippled by a ransomware attack such as “Petya” ,  WannaCry or WannaCrypt ransomware attack affected more than 230,000…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Militaries looking for anti-laser weapon defences as laser DEW threats to airline pilots, soldiers and military vehicles is rising

laserdamage

Laser attacks targeting pilots and air crews are a major concern across the world with most attacks reported to take place during take-off and landing. According to figures from the US Federal Aviation Authority, there were 6,753 laser illuminations reported in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Global threat of landmines and IED that kill thousands of people every year require new technologies for detection

bab2d5d59ac444db8043a4f3e32c9f0e

Landmines are a global threat. Several countries suffer from the existence of millions of buried landmines in their territories. These landmines have indefinite life, and may still cause horrific personal injuries and economic dislocation for decades after a war has…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries race to employ Blockchain, the virtual currencies technology, for tamper-proof military systems and cybersecurity

blockchain

Blockchain is a transformative technology for the two billion people in the world currently underserved by financial institutions. The technology has the potential to enhance privacy, security and freedom of conveyance of data. Blockchain is based on open, global infrastructure,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Supercomputers can assist in Cyber Security by Identifying threats, detecting anomalous behaviour and finding software vulnerabilities

Threats 1000x600 3

Supercomputers have  become essential for National Security, for decoding encrypted messages, simulating complex ballistics models, nuclear weapon detonations and other WMD, developing new kinds of stealth technology, and cyber defence/ attack simulation. Because of the expense, supercomputers are typically used…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Industry developed new approach to protect against advanced ‘ROP’ Cyberattacks

ROP

Today’s cybersecurity playing field is fundamentally asymmetric. Attackers are easily able to identify weaknesses in a target system once they have access to its code and configuration. As a result, defenders are perpetually playing a game of catch-up to secure…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber risks of Video-conferencing apps like Zoom, popular with professionals working from home globally

zoom app

Video conferencing apps like Zoom have become popular with professionals working from home globally, who are using it for virtual meetings, presentations and calls.  Millions of people have turned to the app as they work and study from home amid…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

High-assurance Network encryptors secure voice, video, and data moving over public and private IP networks

network encryption for financial services 29 638

Protecting network transmitted data against cyber attacks and data breaches is imperative for government agencies. Data network eavesdropping, innocent error or technical failure, data tampering and data theft have all become commonplace. The implications of a significant breach are often…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Avalanches, the most destructive natural hazards threatening human life, and built structures in mountainous regions, require accurate early warning and predicition systems

AvalancheForecast feature

Snow avalanches are among the most destructive natural hazards threatening human life, ecosystems, built structures, and landscapes in mountainous regions.   Avalanches and landslides are common in Himalayan Kashmir. Avalanches have caused some of the heaviest tolls for the Indian…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Global threat Intelligence and warnings shared by Cyber Agencies enables mitigating cyber threats before large scale exploitation by hackers

cybersharing

According to the World Economic Forum’s 2016 Global Risks Report, cyber-security is recognised as one of the greatest threats to business worldwide, and the global cost of crimes in cyberspace is estimated to be $445bn. By 2021, cybercrime damage is…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here