Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Militaries employ ‘The mother of all bombs’ or MOABs for wiping out fortified ground targets and creating ‘shock and awe’

MOAB

The US’s  GBU-43/B Massive Ordnance Air Blast (MOAB) is a precision-guided munition weighing 21,500 pounds and was dropped from a C-130 Hercules aircraft. The MOAB isn’t the heaviest non-nuclear bomb in the US arsenal (that’s the 30,000-pound Massive Ordinance Penetrator…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Nigerian Military’s offensive using latest technology to push Boko Haram back out of most territory, UN asks to address ‘Roots of conflict’

nigerean

The claims by Nigeria’s government that terrorist group Boko Haram has been “defeated” continue to ring hollow. An attack by the terrorist group on an army base  in Nov 2018 led to as many as 100 soldiers being killed, Reuters…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA plans secure Blockchain technologies to create tamper-proof military computer systems

darpablockchain

Blockchain is a transformative technology for the two billion people in the world currently underserved by financial institutions. The technology has the potential to enhance privacy, security and freedom of conveyance of data. Blockchain is based on open, global infrastructure,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Military ATAK situational awareness tool serving Fire Fighters, law enforcement, and first-responder communities.

Atak

When Hurricane Harvey hit Texas, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) deployed the Android Team Awareness Kit (ATAK) to support the complex communication and coordination needs of the multi-jurisdictional responders. Most of the operators provided…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

IARPA using Big Data Analytics to automatically discover Signals from Web Sources to Predict Cyber Attacks

article predictcyber

Cyber crimes and attacks continue to expand exponentially and involving more and more advanced and sophisticated techniques to infiltrate corporate networks and enterprise systems. Types of attacks include advanced malware, zero day attacks and advanced persistent threats. Flawed software, the root…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s PLINY & MUSE use Big Data on open-source software to remove software vulnerabilities and enhance reliability

darapamusepliny

During the past decade information technologies have driven the productivity gains essential to U.S. economic competitiveness, and computing systems now control significant elements of critical national infrastructure. As a result, tremendous resources are devoted to ensuring that programs are correct,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA enhancing Military COTS system security by automatically deploying secure configurations of Components

cotsDARPA

The growth of the internet-of-things (IoT) and network-connected composed systems (e.g., aircraft, critical-infrastructure, etc.) has led to unprecedented technical diversity in deployed systems. From consumer IoT devices developed with minimal built-in security, which are often co-opted by malware to launch…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries developing bomb disposal robots having exceptional level of versatility, dexterity and diversity

bombdisposalrobot

EOD operators or ammunition technical officers conduct some of the military’s most dangerous jobs, who has the daunting task of dismantling, defusing and disposing bombs and other explosive ordnance, often in the most hostile and challenging of environments. Making this job…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Detecting and Mitigating Advanced persistent threat (APT) major challenge for IT Firms, industrial establishments, and military organizations.

apt lifecycle

An advanced persistent threat (APT) refer to complex, sophisticated and stealthy techniques of using software, hardware or social engineering tools to continuously monitor and extract data from targets such as organizations and/or nations for business or political motives. They typically…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Synthetic Identity Fraud is one the fastest-growing forms of identity theft used by fraudsters and terrorists

syntheic fraud

Synthetic identity theft is a type of fraud in which a criminal combines real and fake information to create a new identity, which is used to open fraudulent accounts and make fraudulent purchases. Fraudsters use this fictitious identity for obtaining…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here