Cyber Security

CCTV PROTOCOL

DailyPost 417 CCTV PROTOCOL CCTVs have become all pervasive,  for good, bad or the ugly, it is here to stay.  These networks provide the live & video footages generally of public places,  as our personal pictures & videos. The huge demand & so  small to big projects are developing as a jungle growth,  not able

CCTV PROTOCOL Read More »

BITCOIN – THE EVOLVING STORY

DailyPost 410 BITCOIN – THE EVOLVING STORY The current exchange rate of 1 bitcoin $7157.14.  This explains the strength of bitcoin & other  altcoins  which number at around  1150 . Altcoins are cryptocurrencies other that bitcoin. The acceptability of bitcoins and like is increasing with every passing day. Suffice to stay, it is there to

BITCOIN – THE EVOLVING STORY Read More »

THE CISO STORY

DailyPost 403 THE CISO STORY CISOs have slowly become an integral part of our digital landscape.  The consequent impact on the enterprises does not seem to be visible. Enterprises seem to be as vulnerable as ever &  their climb down on the vulnerability index  is yet to start. The surface area and the threat vectors

THE CISO STORY Read More »

LONE WOLF ATTACK

DailyPost 402 LONE WOLF ATTACK Sept the 11th, 2001, was a defining moment in the history of terrorism & of the modern world. The trajectory terrorism has taken since then has defied all rational explanation & also imagination. From group of highly motivated, well guided, based on a neat plan  transforming an aircraft into a

LONE WOLF ATTACK Read More »

LATENT DATA

DailyPost 381 LATENT DATA  Data is the biggest asset and has been termed as today’s oil.  Datafication of world is happening at a breath taking pace.  From property to money to sentiments have already become data  or would shortly be so. Data can broadly be divided into  transient & latent data. The general usage of

LATENT DATA Read More »

WHITE HATS

DailyPost 379 WHITE HATS Even to the ignorant & the uninitiated WannaCry & Petya global level hacking epidemic, made them aware of the  immense damages the hackers can do.  There is a general perception that hackers can  breach systems at will  and the gap between their expertise, focus, effort & precision and of  the enterprises

WHITE HATS Read More »

Scroll to Top