Cyber Security

CRYPTO WARS

DailyPost 537 CRYPTO WARS If we ever thought that cyber security is all about technology & hackers capability to breach, it is a total misconception. The real villain of piece came to light after decades, courtesy Edward Snowden& remained so since then. It’s the National Security Agency, NSA, followed by the FBI. They rule the

CRYPTO WARS Read More »

NERVE AGENT ATTACK

DailyPost 534 NERVE AGENT ATTACK If Russian Cyber attack to manipulate the US Presidential elections in 2016, was not enough, the nerve agent attack on 4th March 2018, opened up a Pandora’s box; as to how devastating Russia can be. The March 4th nerve agent attack on Sergie V. Skripal, ex informant to the British

NERVE AGENT ATTACK Read More »

THE MESSINESS OF DATA

DailyPost 532 THE MESSINESS OF DATA As we keep moving into the Data Age, the messiness of data keep increasing, albeit with an objective and far from the customers / citizens eye. What could have been called as business data or consumer behaviour data has become surveillance data on the customers. The data sourced from

THE MESSINESS OF DATA Read More »

GENERAL DATA PROTECTION REGULATION, GDPR – 2018

DailyPost 521 GENERAL DATA PROTECTION REGULATION, GDPR – 2018. Passed nearly two years ago by the European Parliament, GDPR, is scheduled for full implementation from 25th May 2018. A framework for MNCs; combination of data privacy & security mandates, unprecedented in many cases. Right to be forgotten, Privacy by design & by default and Data

GENERAL DATA PROTECTION REGULATION, GDPR – 2018 Read More »

RANSOMWARE – AS – A – SERVICE

DailyPost 512 RANSOMWARE – AS – A – SERVICE Cloud revolutionised the IT landscape by making hardware, software and computing graduate to a level of a service. All such headache was handed over to cloud service provider. Criminals being the first adopters of technology. Taking a cue from Software-as-a-service provided on the Cloud, ransomware-as-a-service (RaaS)

RANSOMWARE – AS – A – SERVICE Read More »

VIGILANCE ON DATA, DATA FOR VIGILANCE.

DailyPost 511 VIGILANCE ON DATA, DATA FOR VIGILANCE. The collection, collation, collaboration, analysis and finally the intelligence created in data decides our fate, fate of the enterprise, investigative & vigilance and intelligence agencies. With documents, movements and various nefarious activities all becoming data, what is the way out! Data has become the best & the

VIGILANCE ON DATA, DATA FOR VIGILANCE. Read More »

BASE DOCUMENTS

DailyPost 481 BASE DOCUMENTS Documents which provide the purpose, definition, ingredients & the modalities to create, operate & facilitate achieving the results can be termed as Base Documents. Though all of us are in search of such documents to gather basic functional knowledge of the topic, project or technology, it is goes unexpressed. The creation

BASE DOCUMENTS Read More »

GOOGLED : VULNERABILITIES IN CHIP

DailyPost 466 GOOGLED: VULNERABILITIES IN CHIP While cyber breaches are legally mandated to intimated to the law enforcement agencies at least in all developed countries, what happens if the vulnerabilities pertain to the chip, hardware, the architecture itself? While doing specular memory research, Google discovered vulnerabilities in Intel & other chips. Chips would thus become

GOOGLED : VULNERABILITIES IN CHIP Read More »

ARTIFICIAL INTELLIGENCE TRENDS 2018

DailyPost 462 ARTIFICIAL INTELLIGENCE TRENDS 2018 2017 has been a breakthrough year with the achievements of AlphaZero, moving into a machine created Intelligence. Alexa was added to our repository of Siri, Cortana, making a beginning in AI assistants age. Huge amount of funding is going in AI research. It becomes the main narrative of future

ARTIFICIAL INTELLIGENCE TRENDS 2018 Read More »

Scroll to Top