
DO WE KNOW OUR INTERFACES?
DailyPost 219 DO WE KNOW OUR INTERFACES? Interactions are at the base of the existence of individuals as social animals and enterprises for professional and
DailyPost 219 DO WE KNOW OUR INTERFACES? Interactions are at the base of the existence of individuals as social animals and enterprises for professional and
DailyPost 198 CYBER SECURITY IN CRISIS CAN CISOs SALVAGE IT? “Technology… is a queer thing; it brings great gifts with one hand and it stabs
DailyPost 197 DELVE A FEW LAYERS DEEP! A superficial understanding provides only an ephemeral peep into the reality, inconsistent to real requirements of the day,
DailyPost 174 CYBER CRIME & INCIDENT RESPONSE Cyber Security Incident or Cyber Crime whichever way we look at the hacks, breaches and thefts, there is
DailyPost 171 TRANSPARENCY IN THE DIGITAL WORLD There has been a paradigm shift in the concept of transparency since the onset of the digital
DailyPost 169 CIA Leaks The Wikileaks has done it again, a core competency it has mastered over the years. It’s first leak was flaunted as
DailyPost 167 CYBER SECURITY & COMPANY VALUATION With the nature of attacks of Yahoo, Bank of Bangladesh, Target and endless other hacks, Cyber Security for
DailyPost 143 DIGITAL IRON DOME TECHNOLOGY Wish cyber attacks going unabated and breaking into systems which had been treated as impregnable, Israel is in the
DailyPost 111 Where is the ‘INTELLIGENCE’ Russian hacking and the President elect Trump’s not buying the intelligence story has put the US Intelligence Agencies /
DailyPost 103 DEMOCRACY HACKED! That we are moving ahead on a untrodden path in an uncharted territory is an understatement. The 2016 American elections were
DailyPost 95 BLOCK CHAIN TECHNOLOGY – 2016 – A PATH BREAKING YEAR TECHNOLOGY Blockchain Technology has immense potential and its research & development can open
DailyPost 91 RANSOMEWARE Ransom, the world has been aware for times immemorial, as a critical element in the money being generated out of crime. The
DailyPost 83 HACKTIVISTS To my repeated questions in my lectures on Cyber Security as to who is at the centre of the digital world ,
DailyPost 82 COMPROMISED, YET AGAIN! The recent news of Yahoo breach of 1 billion accounts compromised is the biggest in its infamous history. It throws
DailyPost 78 DATA – ENCRYPTED ALWAYS The process of transforming data from plaintext to ciphertext is encryption and had been used since times immemorial. Today,
DailyPost 74 NATIONAL HOMELAND SECURITY BLUEPRINT The passage of the US PATRIOT ACT and subsequent creation of Department for Homeland Security, DHS, post 9/11 marks
DailyPost 73 TECHNOLOGY DEFICIT IN POLICING – CHALLENGES POSED BY COMMUNICATION TECHNOLOGY Communication technology has brought immense benefits to the world by completely transforming communication to
DailyPost 69 CYBER SECURITY INTEGRATED SYSTEMS MINDSET – THE WAY FORWARD An eye for an eye and a tooth for a tooth is retribution and
DailyPost 60 BLOCKCHAIN TECHNOLOGY- THE EMERGING TECHNOLOGY TO WATCH From drones to 3D printing to nanotechnology, emerging technologies are providing completely out of the box
DailyPost 59 CYBER SECURITY – THE HUMAN RESOURCE CHALLENGE- THE DATA SCIENTIST Every roadmap has a gestation period while the MTech courses get underway in
DailyPost 58 CYBER SECURITY- THE HUMAN RESOURCE CHALLENGE The Cyber Security landscape has transformed for the worse in last three years. Cyber Security Policy 2013
DailyPost 57 INFORMATION WAR/FARE The battle for your mind is underway. A world war is raging all over and that is not the war on terror,
DailyPost 53 IS COMPLIANCE JUST AN ISSUE? Treating compliance, standards and certification as mere compliance issues is fraught with dangers that negatively affects performance, user
DailyPost 51 HOMELAND SECURITY-A ROBUST COUNTER MECHANISM The attack on the World Trade Center has been by far the most important event in the history
DailyPost 46 GREAT INSTITUTIONS MAKE A GREAT NATION As life moves on to a totally different trajectory, in an ultra connected world, with expectations of
DailyPost 45 CHANGE IN CULTURE Cyber attacks goes on unabated, increasing in both intensity and frequency. Hacking capabilities is supposed to be at the root
DailyPost 20 CYBER SECURITY / INSECURITY / WAR Cyber Security is a battle of knowledge, effort, focus & precision. Government’s glacial age response & MNCs
DailyPost 7 GETTING HACKED IS THE NEW NORMAL Hackers & hacktivists operate unabated and at will on the sector, activity and geography of their choice.