BASE DOCUMENTS

DailyPost 579 BASE DOCUMENTS Documents on which you base your work, activity, task or project in any specialised area is a Base Document. The creation

Read More »

NATIONAL CCTV PROTOCOL

DailyPost 570 NATIONAL CCTV PROTOCOL Everything grows like a jungle in this country but for the jungle. Education & health seem to be perfect examples.

Read More »

”THE CYBER EFFECT”

DailyPost 554 ”THE CYBER EFFECT” While the technology part and its bountiful benefits of the Cyber Age have been driven home with elan by the

Read More »

ACADEMIC CONSCIENCE

DailyPost 545 ACADEMIC CONSCIENCE The core competency of the world seems to have converged in murky dealings. The heady mix of commercial, politics & research

Read More »

LAW TECHNOLOGY INTERFACE

DailyPost 544 LAW TECHNOLOGY INTERFACE Law, governance & management decided the fate of technology. Not any more. Technology now comes as blitzkrieg & control systems

Read More »

CAN DATA EVER BE SAFE?

DailyPost 541 CAN DATA EVER BE SAFE? From critical infrastructure to Cambridge Analytica & Facebook, the aghast users across the globe wants to know, can

Read More »

“PRIVACY SOLUTIONS”

DailyPost 538 “PRIVACY SOLUTIONS” The point is that politics can undermine technology, and also that technology can undermine politics. Neither trumps the other.” said Bruce

Read More »

CRYPTO WARS

DailyPost 537 CRYPTO WARS If we ever thought that cyber security is all about technology & hackers capability to breach, it is a total misconception.

Read More »

NERVE AGENT ATTACK

DailyPost 534 NERVE AGENT ATTACK If Russian Cyber attack to manipulate the US Presidential elections in 2016, was not enough, the nerve agent attack on

Read More »

THE MESSINESS OF DATA

DailyPost 532 THE MESSINESS OF DATA As we keep moving into the Data Age, the messiness of data keep increasing, albeit with an objective and

Read More »

OVERSIGHT MECHANISM

DailyPost 527 OVERSIGHT MECHANISM While all organisations have their systems of reviews, meetings, supervision, inspection and the like, when incidents happen, we see people running

Read More »

BASE DOCUMENTS

DailyPost 481 BASE DOCUMENTS Documents which provide the purpose, definition, ingredients & the modalities to create, operate & facilitate achieving the results can be termed

Read More »

CYBER SECURITY TRENDS 2018

DailyPost 461 CYBER SECURITY TRENDS 2018 Since 2014, Cyber Security has continually reminded the number one security threat to the world. WannaCry, Petya and backend

Read More »

UBIQUITOUS SURVEILLANCE

DailyPost 451 UBIQUITOUS SURVEILLANCE As the privacy debates rages globally, govts diametrically opposite in their creation & thought processes, US & China end up doing

Read More »

DATA PROTECTION FRAMEWORK

DailyPost 446 DATA PROTECTION FRAMEWORK The Supreme Court of India, recently declared Privacy as a fundamental right. It left it to the Expert Committee under

Read More »

REVOLVING DOORS & BACKDOORS

DailyPost 438 REVOLVING DOORS & BACKDOORS While the Privacy debate rages at the highest pitch, the companies guaranteeing privacy from the rooftops, the hapless user

Read More »

NSA

DailyPost 436 NSA : Do they know all?  Lead by the National Security Agency, NSA, US’s 17 intelligence agencies see the world differently. Shrouded in

Read More »

TRANSACTING DIGITAL IDENTITY

DailyPost 420 TRANSACTING DIGITAL IDENTITY In an all pervasive digital world, everybody has a digital identity.  The primary is the official databases, from where identity

Read More »

CCTV PROTOCOL

DailyPost 417 CCTV PROTOCOL CCTVs have become all pervasive,  for good, bad or the ugly, it is here to stay.  These networks provide the live

Read More »

THE CISO STORY

DailyPost 403 THE CISO STORY CISOs have slowly become an integral part of our digital landscape.  The consequent impact on the enterprises does not seem

Read More »

LONE WOLF ATTACK

DailyPost 402 LONE WOLF ATTACK Sept the 11th, 2001, was a defining moment in the history of terrorism & of the modern world. The trajectory

Read More »

LATENT DATA

DailyPost 381 LATENT DATA  Data is the biggest asset and has been termed as today’s oil.  Datafication of world is happening at a breath taking

Read More »

WHITE HATS

DailyPost 379 WHITE HATS Even to the ignorant & the uninitiated WannaCry & Petya global level hacking epidemic, made them aware of the  immense damages

Read More »

SEAMLESS INTEGRATION

DailyPost 364 SEAMLESS INTEGRATION  Though in vogue for a long time seamless integration is most areas is conspicuous by its absence.  Even if it happens

Read More »

INTELLIGENT CONVERGENCE

DailyPost 356 INTELLIGENT CONVERGENCE The final aim of Command & Control Center, necessarily is, what we can conveniently call  Intelligent Convergence.  The need of convergence

Read More »

THE CCTV SYNDROME

DailyPost 349 THE CCTV SYNDROME From the black & white still camera with lots of manual processing at the back end to colour, then video,

Read More »

SILK ROAD

DailyPost 347 SILK ROAD Silk Road is a online black market  & is the first modern Darknet marketplace famous for  illegal drug trade . It

Read More »

DARKNET

DailyPost 346 DARKNET The all pervasive nature of Internet & it’s omnipotent usage has made us believe that while information repository is at our fingertips.

Read More »

THE SCARE OF AI

DailyPost 341 THE SCARE OF AI The age of scare has hit the IT world straddled between the hackers on the one side and the

Read More »

ARE LEAKS REDEFINING THE WORLD?

DailyPost 337 ARE LEAKS REDEFINING THE WORLD?  WikiLeaks started in 2006  in Iceland by an organisation Sunshine Press with  Julian Assange,  an Australian Internet activist

Read More »
Scroll to Top