
WHITE HOUSE – THE WAR OF ATTRITION
DailyPost 328 WHITE HOUSE – THE WAR OF ATTRITION Max Weber’s model of bureaucracy is on which modern democracies run, in simple terms, work on

DailyPost 328 WHITE HOUSE – THE WAR OF ATTRITION Max Weber’s model of bureaucracy is on which modern democracies run, in simple terms, work on

DailyPost 325 TALENT IMPERATIVES FOR CYBERSECURITY Tonnes have been written about the nature of cyber attacks, it’s technological complexity & its geographical spread. WannaCry &

DailyPost 321 NEW BREED OF ATTACKS NEEDS NEW APPROACH The new breed of attacks in the last few months have been more than embarrassing for

DailyPost 317 BALRIDGE CYBER SECURITY EXCELLENCE BUILDER US has for long used the Balridge Excellence Framework and gained considerable expertise based on this model in

DailyPost 315 ANONYMISATION OF DATA Data is the biggest asset today. By conventional wisdom & legality, the owner of the data is the person to

DailyPost 306 CITY BASED VIDEO SURVEILLANCE SYSTEM CCTVs have been vogue for quite sometime now, in silos, in business enterprises, malls, transportation hubs, offices, in

DailyPost 299 LAZARUS – CYBER COLLECTIVE If the Stuxnet attack can be rightly be called as the 9/11 of Cyber Security, then Lazarus certainly qualifies

DailyPost 298 CYBER MAFIAS From Al Qaeda to ISIS all well known & we’ll documented in our world, their strategies known, methods of handling them

DailyPost 284 DEATH OF CONVENTIONAL TELEPHONY Strange as it may sound, the dooms day might not be far off. Amongst the smart phone users the

DailyPost 276 ANOTHER CYBER ONSLAUGHT As hacking of American democracy was hotting up, another Cyber Onslaught has send the world in a tizzy, close

DailyPost 272 THE LID IS OFF – The Washington Post The Washington Post has taken off the lid on the vaguely known saga of

DailyPost 269 “ACCIDENTALLY LEFT EXPOSED” The litany of woes of Cyber Security does not seem to end. The breach & the vulnerability, both are

DailyPost 255 NATIONAL CYBER SECURITY UNIVERSITY – A Pure Research Entity. Researchers & research is the only light at the at the end of the

DailyPost 241 ROBUST FUNCTIONING; ROBUST RESPONSE The WannaCry media glare has died down, but the problem keeps glaring on our faces. We might face a

DailyPost 235 CYBER SECURITY- LIP SERVICE CONTINUES With the heat of the WannaCry seemingly dying, the impact of the attack in terms of bringing forth

DailyPost 234 CYBER SECURITY – AT THE CENTRE STAGE? Since 2014 Cyber Security has been positioned as the single biggest threat by the US. For

DailyPost 233 SECURITY AUDIT WannaCry’s impact is still being deciphered all across the globe. A known vulnerability for which patch is available can do such

DailyPost 232 CONSULTANCY, CERTIFICATION & COMPLIANCE – How Effective? The effectiveness of this model was for long in question both as a mode of prevention

DailyPost 231 IT WAS IN THE OFFING The historic cyber attack of Friday is ominous of the fact that 3rd World War would be a

DailyPost 229 RESILIENCE – THE WAY FORWARD Hacks & breaches rule the roost on a day to day basis, with most of the sectors &

DailyPost 227 A WORLD WITHOUT SECRETS Secrecy, privacy & confidentiality are basic human requirements & has been mandated by law globally . Secrecy seems to

DailyPost 219 DO WE KNOW OUR INTERFACES? Interactions are at the base of the existence of individuals as social animals and enterprises for professional and

DailyPost 198 CYBER SECURITY IN CRISIS CAN CISOs SALVAGE IT? “Technology… is a queer thing; it brings great gifts with one hand and it stabs

DailyPost 197 DELVE A FEW LAYERS DEEP! A superficial understanding provides only an ephemeral peep into the reality, inconsistent to real requirements of the day,

DailyPost 174 CYBER CRIME & INCIDENT RESPONSE Cyber Security Incident or Cyber Crime whichever way we look at the hacks, breaches and thefts, there is

DailyPost 171 TRANSPARENCY IN THE DIGITAL WORLD There has been a paradigm shift in the concept of transparency since the onset of the digital

DailyPost 169 CIA Leaks The Wikileaks has done it again, a core competency it has mastered over the years. It’s first leak was flaunted as

DailyPost 167 CYBER SECURITY & COMPANY VALUATION With the nature of attacks of Yahoo, Bank of Bangladesh, Target and endless other hacks, Cyber Security for

DailyPost 143 DIGITAL IRON DOME TECHNOLOGY Wish cyber attacks going unabated and breaking into systems which had been treated as impregnable, Israel is in the

DailyPost 111 Where is the ‘INTELLIGENCE’ Russian hacking and the President elect Trump’s not buying the intelligence story has put the US Intelligence Agencies /

DailyPost 103 DEMOCRACY HACKED! That we are moving ahead on a untrodden path in an uncharted territory is an understatement. The 2016 American elections were

DailyPost 95 BLOCK CHAIN TECHNOLOGY – 2016 – A PATH BREAKING YEAR TECHNOLOGY Blockchain Technology has immense potential and its research & development can open

DailyPost 91 RANSOMEWARE Ransom, the world has been aware for times immemorial, as a critical element in the money being generated out of crime. The

DailyPost 83 HACKTIVISTS To my repeated questions in my lectures on Cyber Security as to who is at the centre of the digital world ,

DailyPost 82 COMPROMISED, YET AGAIN! The recent news of Yahoo breach of 1 billion accounts compromised is the biggest in its infamous history. It throws

DailyPost 78 DATA – ENCRYPTED ALWAYS The process of transforming data from plaintext to ciphertext is encryption and had been used since times immemorial. Today,

DailyPost 74 NATIONAL HOMELAND SECURITY BLUEPRINT The passage of the US PATRIOT ACT and subsequent creation of Department for Homeland Security, DHS, post 9/11 marks

DailyPost 73 TECHNOLOGY DEFICIT IN POLICING – CHALLENGES POSED BY COMMUNICATION TECHNOLOGY Communication technology has brought immense benefits to the world by completely transforming communication to

DailyPost 69 CYBER SECURITY INTEGRATED SYSTEMS MINDSET – THE WAY FORWARD An eye for an eye and a tooth for a tooth is retribution and

DailyPost 60 BLOCKCHAIN TECHNOLOGY- THE EMERGING TECHNOLOGY TO WATCH From drones to 3D printing to nanotechnology, emerging technologies are providing completely out of the box

DailyPost 59 CYBER SECURITY – THE HUMAN RESOURCE CHALLENGE- THE DATA SCIENTIST Every roadmap has a gestation period while the MTech courses get underway in

DailyPost 58 CYBER SECURITY- THE HUMAN RESOURCE CHALLENGE The Cyber Security landscape has transformed for the worse in last three years. Cyber Security Policy 2013

DailyPost 57 INFORMATION WAR/FARE The battle for your mind is underway. A world war is raging all over and that is not the war on terror,

DailyPost 53 IS COMPLIANCE JUST AN ISSUE? Treating compliance, standards and certification as mere compliance issues is fraught with dangers that negatively affects performance, user

DailyPost 51 HOMELAND SECURITY-A ROBUST COUNTER MECHANISM The attack on the World Trade Center has been by far the most important event in the history

DailyPost 46 GREAT INSTITUTIONS MAKE A GREAT NATION As life moves on to a totally different trajectory, in an ultra connected world, with expectations of

DailyPost 45 CHANGE IN CULTURE Cyber attacks goes on unabated, increasing in both intensity and frequency. Hacking capabilities is supposed to be at the root

DailyPost 20 CYBER SECURITY / INSECURITY / WAR Cyber Security is a battle of knowledge, effort, focus & precision. Government’s glacial age response & MNCs