Introduction In the previous two parts of this blog, several strategic issues related to defense of our national cyberspace in the broad areas of governance, operational aspects and development of… Read more »
Introduction The imperative of operationalizing the concepts of Cyber Deterrence and Active Defence for defending our national cyberspace was highlighted in the first part of this blog. It was further… Read more »
When it comes to cyber security in and of our country, there is a lot to achieve. This write-up attempts to discuss some of the issues which have strategic significance… Read more »
… What it means for a nation and businesses? The digital revolution has had a profound economic and social impact on the world at large. Transforming international trade, traditional business… Read more »
Going by the recent media reports, it would seem that the malicious hacker groups behind data breaches are in a competition of sorts. The latest Equifax data breach, which exposed… Read more »
The World Wide Web is replete with news stories and analyst reports of data leakage and theft ostensibly by ‘trusted’ employees leading to irreparable loss of brand trust and the inevitable lawsuit and resultant fines. How do you secure your precious data against such loss? Here are four steps that every data security practitioner needs to be aware of.