Media

AND NOW HEALTH DATA HACK!

DailyPost 2768 AND NOW HEALTH DATA HACK! Investigation of crime is a state duty and they should have the wherewithal to do it, with predictability and concrete results. It can be any crime from terrorism to money laundering to newer and newer areas of cybercrime. This does not seem to the case when it comes

AND NOW HEALTH DATA HACK! Read More »

NOW SAP AT HIGH RISK!

DailyPost 2766 NOW SAP AT HIGH RISK! The question arises who is not at risk? Getting hacked is the new normal. It’s not whether you will be hacked or not, the issue is when? Resilience is the key and the tech preparedness for it is the name of the game. Close on the heels of

NOW SAP AT HIGH RISK! Read More »

DOES REENACTMENT RESURRECT CONSTITUTIONALITY?

DailyPost 2765 DOES REENACTMENT RESURRECT CONSTITUTIONALITY? Parliament is sovereign and can enact laws or amend laws going through the prescribed legislative process. What the prescribed legislative process has been brought to, the country has been experiencing session on session. We are not talking just of disruptions or parliamentary stalemates, that is only one part of

DOES REENACTMENT RESURRECT CONSTITUTIONALITY? Read More »

DOXXING?

DailyPost 2761 DOXXING? As the world metamorphoses into a fully enabled tech world and the gap between the two worlds gets more and more morphed to one cyber-physical synthesized world, new ways of crimes, new crimes and social aberrations are bound to increase. Doxxing is one of those. What does it entail? In simple terms

DOXXING? Read More »

DAIXIN RANSOMWARE GANG

DailyPost 2760 DAIXIN RANSOMWARE GANG As in the physical world, the cyber world also has gangs. It would be strange if the most popular cybercrime of the day did not have any gangs, i.e., ransomware. Hacking is the new normal has slowly become a truism to the extent that the organisation breached upon has a

DAIXIN RANSOMWARE GANG Read More »

DNS AND CYBER THREATS

DailyPost 2759 DNS AND CYBER THREATS The world of cyber threats literally provides a mirror image of the functioning of the cyber world, usage of tools, expertise and social engineering to create a breach for various motives and preferably get away with it. Uncovering threats and building capabilities to protect against these threats is what

DNS AND CYBER THREATS Read More »

Scroll to Top