PRESIDENCY TRUMPED!

DailyPost 659 PRESIDENCY TRUMPED! American Presidency & democracy are very deeply intertwined. The most powerful person on the planet is also the leader of the

Read More »

DIGITAL DUPLICITY

DailyPost 654 DIGITAL DUPLICITY The user is got into the trap with impunity with the agree / accept button at the end of terms &

Read More »

IT GIANTS BUSINESS MODEL

DailyPost 653 IT GIANTS BUSINESS MODEL IT giants rule the world as technology permeated into every aspect of our life inclusive of sentiments & emotions.

Read More »

RAMpage

DailyPost 646 RAMpage Hacking exploits, mitigation and serious hacking possibilities again, evading the mitigation is turning out to an extremely pernicious face of the cyber

Read More »

UNISON OF THOUGHT

DailyPost 638 UNISON OF THOUGHT Cyber Security given the nature of impact its having on the world around would give a feeling that the software

Read More »

DRONE HACKING

DailyPost 634 DRONE HACKING The Unmanned Aerial Vehicle, UAV, now popularly known as drones, after it got into large scale civilian and commercial usage. It’s

Read More »

PRIVACY POLICY

DailyPost 632 PRIVACY POLICY Their can be either  rampant data broking or Privacy. The two cannot coexist. The Privacy policy to date only adorns websites

Read More »

GDPR & BEYOND!

DailyPost 626 GDPR & BEYOND! As we celebrate the onset of GDPR from 25th of May, 2018 and flurry of activity all around the globe

Read More »

SURREAL

DailyPost 625 SURREAL Many people in the world would think of this as a form of fantasy … from a science fiction movie,” is one

Read More »

EXPERTISE ALWAYS DELIVERS

DailyPost 622 EXPERTISE ALWAYS DELIVERS Experts may not, expertise always does. In the make believe world created today, one is forced to make a distinction.

Read More »

DATA PROTECTION OFFICER

DailyPost 616 DATA PROTECTION OFFICER Besides CEO, the COO and CTO would steer the IT enterprise through the rough and tumble of business. Later, CIO

Read More »

LONE WOLVES

DailyPost 613 LONE WOLVES Lone wolf from where this term is derived, pertains to the current trend of individuals; getting radicalised on their own, mainly

Read More »

CYBER CRIME GEOGRAPHY

DailyPost 611 CYBER CRIME GEOGRAPHY Geography has become history has become a famous adage of the digital operations. Bereft of the spatial context does not

Read More »

CYBER READINESS INDEX

DailyPost 597 CYBER READINESS INDEX Given the nature of our dependence on ICT in every facet our existence, the concerns regarding Cyber Readiness is not

Read More »

BASE DOCUMENTS

DailyPost 579 BASE DOCUMENTS Documents on which you base your work, activity, task or project in any specialised area is a Base Document. The creation

Read More »

NATIONAL CCTV PROTOCOL

DailyPost 570 NATIONAL CCTV PROTOCOL Everything grows like a jungle in this country but for the jungle. Education & health seem to be perfect examples.

Read More »

”THE CYBER EFFECT”

DailyPost 554 ”THE CYBER EFFECT” While the technology part and its bountiful benefits of the Cyber Age have been driven home with elan by the

Read More »

ACADEMIC CONSCIENCE

DailyPost 545 ACADEMIC CONSCIENCE The core competency of the world seems to have converged in murky dealings. The heady mix of commercial, politics & research

Read More »

LAW TECHNOLOGY INTERFACE

DailyPost 544 LAW TECHNOLOGY INTERFACE Law, governance & management decided the fate of technology. Not any more. Technology now comes as blitzkrieg & control systems

Read More »

CAN DATA EVER BE SAFE?

DailyPost 541 CAN DATA EVER BE SAFE? From critical infrastructure to Cambridge Analytica & Facebook, the aghast users across the globe wants to know, can

Read More »

“PRIVACY SOLUTIONS”

DailyPost 538 “PRIVACY SOLUTIONS” The point is that politics can undermine technology, and also that technology can undermine politics. Neither trumps the other.” said Bruce

Read More »

CRYPTO WARS

DailyPost 537 CRYPTO WARS If we ever thought that cyber security is all about technology & hackers capability to breach, it is a total misconception.

Read More »

NERVE AGENT ATTACK

DailyPost 534 NERVE AGENT ATTACK If Russian Cyber attack to manipulate the US Presidential elections in 2016, was not enough, the nerve agent attack on

Read More »

THE MESSINESS OF DATA

DailyPost 532 THE MESSINESS OF DATA As we keep moving into the Data Age, the messiness of data keep increasing, albeit with an objective and

Read More »

OVERSIGHT MECHANISM

DailyPost 527 OVERSIGHT MECHANISM While all organisations have their systems of reviews, meetings, supervision, inspection and the like, when incidents happen, we see people running

Read More »

BASE DOCUMENTS

DailyPost 481 BASE DOCUMENTS Documents which provide the purpose, definition, ingredients & the modalities to create, operate & facilitate achieving the results can be termed

Read More »

CYBER SECURITY TRENDS 2018

DailyPost 461 CYBER SECURITY TRENDS 2018 Since 2014, Cyber Security has continually reminded the number one security threat to the world. WannaCry, Petya and backend

Read More »
Scroll to Top