
BASE DOCUMENTS
DailyPost 579 BASE DOCUMENTS Documents on which you base your work, activity, task or project in any specialised area is a Base Document. The creation

DailyPost 579 BASE DOCUMENTS Documents on which you base your work, activity, task or project in any specialised area is a Base Document. The creation

DailyPost 570 NATIONAL CCTV PROTOCOL Everything grows like a jungle in this country but for the jungle. Education & health seem to be perfect examples.

DailyPost 568 PERSONAL DATA; Lip Service Again! Cyber Security is protection of data. At the core of this data is the personal data, which put

DailyPost 554 ”THE CYBER EFFECT” While the technology part and its bountiful benefits of the Cyber Age have been driven home with elan by the

DailyPost 545 ACADEMIC CONSCIENCE The core competency of the world seems to have converged in murky dealings. The heady mix of commercial, politics & research

DailyPost 544 LAW TECHNOLOGY INTERFACE Law, governance & management decided the fate of technology. Not any more. Technology now comes as blitzkrieg & control systems

DailyPost 541 CAN DATA EVER BE SAFE? From critical infrastructure to Cambridge Analytica & Facebook, the aghast users across the globe wants to know, can

DailyPost 540 TECHNOLOGY – PSYCHOLOGY COMPLEX Technology is a double edged tool, the first adopters being high tech criminals & also those who masquerade as

DailyPost 538 “PRIVACY SOLUTIONS” The point is that politics can undermine technology, and also that technology can undermine politics. Neither trumps the other.” said Bruce

DailyPost 537 CRYPTO WARS If we ever thought that cyber security is all about technology & hackers capability to breach, it is a total misconception.

DailyPost 534 NERVE AGENT ATTACK If Russian Cyber attack to manipulate the US Presidential elections in 2016, was not enough, the nerve agent attack on

DailyPost 532 THE MESSINESS OF DATA As we keep moving into the Data Age, the messiness of data keep increasing, albeit with an objective and

DailyPost 527 OVERSIGHT MECHANISM While all organisations have their systems of reviews, meetings, supervision, inspection and the like, when incidents happen, we see people running

DailyPost 521 GENERAL DATA PROTECTION REGULATION, GDPR – 2018. Passed nearly two years ago by the European Parliament, GDPR, is scheduled for full implementation from

DailyPost 512 RANSOMWARE – AS – A – SERVICE Cloud revolutionised the IT landscape by making hardware, software and computing graduate to a level of

DailyPost 511 VIGILANCE ON DATA, DATA FOR VIGILANCE. The collection, collation, collaboration, analysis and finally the intelligence created in data decides our fate, fate of

DailyPost 481 BASE DOCUMENTS Documents which provide the purpose, definition, ingredients & the modalities to create, operate & facilitate achieving the results can be termed

DailyPost 466 GOOGLED: VULNERABILITIES IN CHIP While cyber breaches are legally mandated to intimated to the law enforcement agencies at least in all developed countries,

DailyPost 462 ARTIFICIAL INTELLIGENCE TRENDS 2018 2017 has been a breakthrough year with the achievements of AlphaZero, moving into a machine created Intelligence. Alexa was

DailyPost 461 CYBER SECURITY TRENDS 2018 Since 2014, Cyber Security has continually reminded the number one security threat to the world. WannaCry, Petya and backend

DailyPost 457 COMMODITIZING RANSOMWARE – AS A SERVICE Modern business landscape has a paradigm shift to Subscription Economy. This model is not limited to Netflix

DailyPost 451 UBIQUITOUS SURVEILLANCE As the privacy debates rages globally, govts diametrically opposite in their creation & thought processes, US & China end up doing

DailyPost 448 CRITICAL INFORMATION INFRASTRUCTURE. At the backend of every critical infrastructure is a critical information infrastructure, which keeps it moving. This is the nervous

DailyPost 446 DATA PROTECTION FRAMEWORK The Supreme Court of India, recently declared Privacy as a fundamental right. It left it to the Expert Committee under

DailyPost 438 REVOLVING DOORS & BACKDOORS While the Privacy debate rages at the highest pitch, the companies guaranteeing privacy from the rooftops, the hapless user

DailyPost 437 CYBER POLICE & CYBER SOLDIERS In a recent interview the CEO of Checkpoint stressed the need of Cyber Police & Cyber Soldiers. He

DailyPost 436 NSA : Do they know all? Lead by the National Security Agency, NSA, US’s 17 intelligence agencies see the world differently. Shrouded in

DailyPost 432 CAN WE SALVAGE PRIVACY? Edward Snowden ripped off the lid of Govt. surveillance in the US, the shock US & the world has

DailyPost 420 TRANSACTING DIGITAL IDENTITY In an all pervasive digital world, everybody has a digital identity. The primary is the official databases, from where identity

DailyPost 417 CCTV PROTOCOL CCTVs have become all pervasive, for good, bad or the ugly, it is here to stay. These networks provide the live

DailyPost 410 BITCOIN – THE EVOLVING STORY The current exchange rate of 1 bitcoin $7157.14. This explains the strength of bitcoin & other altcoins which

DailyPost 404 CYBER CRIME – THE INVESTIGATION ANGLE Whatever be the genre of crime, the capability of the investigative agencies & that of the whole

DailyPost 403 THE CISO STORY CISOs have slowly become an integral part of our digital landscape. The consequent impact on the enterprises does not seem

DailyPost 402 LONE WOLF ATTACK Sept the 11th, 2001, was a defining moment in the history of terrorism & of the modern world. The trajectory

DailyPost 381 LATENT DATA Data is the biggest asset and has been termed as today’s oil. Datafication of world is happening at a breath taking

DailyPost 380 WHITE HAT HACKERS – The Way Forward White Hat Hackers seem to be the beacon of hope in the present day world. Security

DailyPost 379 WHITE HATS Even to the ignorant & the uninitiated WannaCry & Petya global level hacking epidemic, made them aware of the immense damages

DailyPost 364 SEAMLESS INTEGRATION Though in vogue for a long time seamless integration is most areas is conspicuous by its absence. Even if it happens

DailyPost 362 CYBER SECURITY MANAGEMENT The world has gone hyper on the technology part of cyber security not realising the fact that finally it has

DailyPost 356 INTELLIGENT CONVERGENCE The final aim of Command & Control Center, necessarily is, what we can conveniently call Intelligent Convergence. The need of convergence

DailyPost 351 THE CCTV SYNDROME- PICTURE QUALITY? The clarity on the coverage area, the positioning of the cameras, in the most scientific manner, to deliver

DailyPost 349 THE CCTV SYNDROME From the black & white still camera with lots of manual processing at the back end to colour, then video,

DailyPost 348 COMMAND & CONTROL CENTER Police control room with a dial 100 facility has been the order of the day for quite some time.

DailyPost 347 SILK ROAD Silk Road is a online black market & is the first modern Darknet marketplace famous for illegal drug trade . It

DailyPost 346 DARKNET The all pervasive nature of Internet & it’s omnipotent usage has made us believe that while information repository is at our fingertips.

DailyPost 342 EU’s GENERAL DATA PROTECTION REGULATION (GDPR) Cyber Security is at the core of our secure existence. MeitY has issued instructions yesterday that 10%

DailyPost 341 THE SCARE OF AI The age of scare has hit the IT world straddled between the hackers on the one side and the

DailyPost 337 ARE LEAKS REDEFINING THE WORLD? WikiLeaks started in 2006 in Iceland by an organisation Sunshine Press with Julian Assange, an Australian Internet activist