Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Military developing sound endpoint management strategies to deal with rising cyber-attacks and data breaches, and increasingly mobile workforce

endpointsecurity

With the rise of cyber-attacks and data breaches, and today’s increasingly mobile workforce, securely managing data and endpoints without inhibiting employee productivity has become critical to organizations including military. Many devices including smart phones, tablets and laptops now have network…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cambridge Pixel’s multi-sensor surveillance system is useful for naval, air traffic control,commercial shipping, security, surveillance and airborne radar applications.

Cambridge Pixel Secure X SecureXI

Countering the growing threat posed by terrorists, smugglers, pirates, and political activists at military air and naval bases, airports, and ports requires sophisticated multisensor surveillance systems to ensure that incursions are rapidly detected and actioned.   Cambridge Pixel , a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Navy asks for new technologies for confronting Irregular and Expeditionary Warfare Challenges

U.S. Navy surface warfare experts are reaching out to industry for identification of technologies that enhance and/or accelerate military capabilities which directly address irregular, expeditionary, and Naval Special Warfare (NSW) capability challenges by meeting operational needs.   The Navy’s primary…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

MARSS’ NiDAR is a long-range surveillance system that can protect naval vessels from air, surface and underwater threats

SAS 2016 MARSS launch mobile version of its NiDAR security system 640 001

Monaco-based MARSS has completed the installation of its NiDAR perimeter security system on the first of six offshore patrol vessels for the Royal Malaysian Navy. The installation is part of a contract awarded by Malaysia’s Boustead Naval Shipyard (BNS), which…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

What would be Cyber future? AI, Persistent surveillance, War of data, Internet of Emotions, and human hacking

cyberscenarios

Cyber attacks are  continuously  increasing in numbers, becoming more varied more sophisticated, and more impactful. What Will Cybersecurity Look Like 10 Years From Now?  According to Gil Shwed, Founder and CEO of Check Point Software Technologies Ltd., the future of cybersecurity…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s LADS program to secure Military Internet of things (MIOT) from cyber and other attacks from adversaries, hackers, and terrorists.

infographic security

The Internet of things (IoT) is the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data. Each thing is uniquely identifiable through its…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The shortages of cyber warriors are driving Militaries to recruit geek armies to complement their cyber force.

cybergeekarmy

The incidents of cyberwarfare are ever increasing, targeting more and more countries and becoming legitimate. Part of the Ukrainian power grid was attacked by hackers, causing blackouts; US accused Iranians of attempting to hack into the control-system of a dam. …...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA investing in breakthrough camera technologies like 4D camera, seeing around corners and digitally mapping the room for urban and unconventional warfare

urbanwarfare

Urban Warfare Operations are complicated by a three-dimensional environment, limited fields of view and fire because of buildings, enhanced concealment and cover for defenders, below-ground infrastructure, and the ease of placement of booby traps and snipers. DARPA  is  investing in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Under High-profile global cyber attacks, Global Cybersecurity Index 2017 measures the commitment of the ITU Member States to cybersecurity

terrorism and social media

Singapore has topped a global cyber security index released by the United Nations, followed by other UN member states such as the United States, Malaysia, Oman, Estonia, Mauritius, Australia, Georgia,     France and Canada, the other top 10 countries. The Index…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Real-time behavioral analytics, new tool for detecting advanced external and internal Cyber threats and mental health, employed by Intelligence agencies to DOD

4246b121d2dc949b8f082c5f57840a3b

An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization’s security practices, data and computer systems. The…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here