Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Telecoms are suffering more attacks than any other sector, Telcos Managing cyber security risks

Top Ten Tech Media Telecom Risks

Telecoms companies, their core infrastructure and the large volumes of personal data they hold on subscribers, all represent an attractive target for malicious actors. Telecoms have suffered more attacks than any other surveyed. Telecoms organisations admitted to having faced four…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

USAF develops Joint cyber operations platform for the execution of full-spectrum cyberspace operations from the operational through tactical levels of warfare

unified platofrm

Developing and delivering air superiority for the highly contested environment in 2030 requires a multi-domain focus on capabilities and capacity, according to the unclassified version of the Air Superiority 2030 Flight Plan.  “After 25 years of being the only great…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries implementing Satellite Based Augmentation Systems (SBAS) to reduce aviation accidents

SBAS

Controlled Flight into Terrain (CFIT) is the #2 leading cause of General Aviation fatal accidents involving the loss of life. There have been over 9,000 deaths due to CFIT since the introduction of commercial jets.  Between 2000 and 2009 approximately…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA MRC developed resilient cloud services that would continue to operate and support military objectives despite being hit by a cyberattack

secure computer systems shrobe 5 728

Cloud computing has burst recently into technology and business scene promising great technical and economic advantages, like offering On-demand provisioning of computer services, improved flexibility and scalability as well as reducing costs. Another attractive point of the cloud is its…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

High profile Events have become preferred targets for Terrorists, comprehensive security demand proper security measures and new technologies

JacksonvilleFloridaEventSecurity

On 22 May 2017 a suicide bomber detonated an improvised explosive device, packed with nuts and bolts to act as shrapnel, in the foyer area of the Manchester Arena. The Manchester Arena bombing was an Islamist terror attack in Manchester,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

U.S., Britain blame Russia for global cyber attack targeting Network Infrastructure Devices

routerattacks

The United States and Britain in 2018 accused Russia of launching cyber attacks on computer routers, firewalls and other networking equipment used by government agencies, businesses and critical infrastructure operators around the globe. Network infrastructure consists of interconnected devices designed to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s Transparent Computing programme for defeating complex, sophisticated and stealthy long-term Advanced Persistent Threats ( APTs)

ce11944b98d0742eead2b016a253afd2

Modern computing systems are essentially black boxes that accept inputs and generate outputs, but provide little-to-no visibility of their inner workings, according to DARPA. It can therefore be extremely challenging to detect an intruder, particularly an ‘Advanced Persistent Threat’: a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

NATO Conducts Locked Shields 2018: World’s Largest International Live-fire Cyber Defense Exercise to train security experts in Cyberwarfare

red team map

The urgency behind NATO’s deepening interest in cyber defense is driven by the increasing sophistication of cyberthreats against member states, according to Brig. Gen. Christos Athanasiadis, assistant chief of staff cyber at SHAPE. NATO reported earlier this year that its…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA CHESS Program plans for human intellect teamed with autonomous technology for cyber defense

CHESS

The Department of Defense (DoD) maintains information systems that depend on Commercial off-the-shelf (COTS) software, Government off-the-shelf (GOTS) software, and Free and opensource (FOSS) software. Securing this diverse technology base requires highly skilled hackers who reason about the functionality of software and identify…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Vehicular Terrorism or ramming attacks require new technologies including directed energy weapons

trucks

Recently in Toronto a rental van was deliberately driven into a crowd of people, killing 10 and injuring 14. Police arrested and charged 25-year-old Alek Minassian in connection with the attack. Though this attack was later found to be caused by…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here