Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

New technologies to secure future Billions of Every day and Military “Internet of Things” and enabling new industrial revolutions such as Industry 4.0

iot security problems challenges and solutions 17 638

By 2025, it is predicted that there can be as many as 100 billion connected IoT devices or network of everyday objects as well as sensors that will be infused with intelligence and computing capability. These devices shall comprise of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Recent reports find rising insider cyber threats, rising Gray / Black Hats, with US & UK topping in number

081011 scaryhacks 1 100541046 gallery.idge

Black hat hackers  are  responsible for writing malware, which is a method used to gain access to these systems. They usually have extensive knowledge about breaking into computer networks and bypassing security protocols. Their primary motivation is usually for personal…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Vulnerabilities in 3D printing could be exploited for Cyber-Physical attacks and Cyber Warfare

3D opportunity risk management table2

3D printing or additive manufacturing is ongoing revolution in manufacturing with its potential to fabricate any complex object and is being utilized from aerospace components to human organs, textiles, metals, buildings and even food. Additive manufacturing, is defined by ASTM…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Future Blended Physical-Cyber Attack shall use multiple attack vectors to cause the mayhem, report anticipates 2M Fatalities

cse 2016 future of cyber security by matthew rosenquist 3 638

Governments, military forces and critical national infrastructure organisations typically deal with some of the most sophisticated cyber threats in use today. These cyber threats continue to grow in sophistication and automation, with attackers ranging from highly skilled and motivated organisations,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New technology to fight human and drug smuggling across maritime borders

drug 1

One of the threat of maritime security is human and drug smuggling across maritime borders. This is particularly important because terrorists may use similar pathways to sneak illegal weapons through the border or to deliver a dirty bomb to seaports.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber Red teaming or penetration testing uncovers the vulnerabilities of an organisation, NEC develops automated tool

penetration testing execution phases 4 638

Cyberattacks are being conducted daily on any type of target, and any notion that a state of full cyber security can be reached is a mere illusion. Cybersecurity is about managing risks and to ascertain that, to a certain extent,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s CHASE to automate cybersecurity across the large, distributed Department of Defense, Enterprise Network

military cyber security 30 Nov 2015

Secure networks are vital to U.S. military operations at all levels and are a source of tactical, operational and strategic advantages. They provide the capability to acquire, move and process massive amounts of information, make decisions rapidly and command distributed…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

UAVs are proving to be disruptive technology for disaster planning, response and relief operations

UK CHINA DRONES

A disaster can be defined as any tragic event stemming from events such as earthquakes, floods, accidents, fires, or explosions. It is a phenomenon that can cause damage to life and property and destroy the economic, social or cultural life…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Wireless and Emergency Communication Tech for Disasters: New Technologies Address Obstacles

SJ EmergencySat 3 in 1FirstNet web

The occurrence of a large natural or man-made disaster is often combined with the destruction of the local infrastructures on the ground. For example, the earthquake in Wenchuan in May, 2008 did not only has a huge destructive power, but…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Across all companies insider Cyber threats are on the rise, New breakthrough technologies being developed to combat them

indisderthreat

CERT Insider Threat Center, a research arm of Carnegie Mellon University’s Software Engineering Institute (SEI). They have defined an insider threat as: …the potential for individuals who have or had authorized access to an organization’s assets to use their access, either…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here