CYBER ATTACK – HOW MUCH TIME DO WE NEED TO NOTIFY THE VICTIMS!

There are time limits in many countries with regards to informing about cyber breach by an entity. More often than it is flouted if the enterprise can get away with it. In cases where the hack finds its way into the public domain and likelihood of a huge regulatory damage, some face saving acceptance is

CYBER ATTACK – HOW MUCH TIME DO WE NEED TO NOTIFY THE VICTIMS! Read More »

THE ORACLE HACKS!

It’s raining hacks all over and has been so for quite some time, the nature of the enterprises and the sectors notwithstanding. Given the precarious situation we are in, the logical step would have been to bring all the stakeholders together, putting their hearts and mind, and finding a solution. A bare minimum starts with

THE ORACLE HACKS! Read More »

THE DRDO DATA LEAK

The story of the modern world will be written on the touchstone of how the cyber threats were handled and resolved by our technologists, technocrats, and the political leaders. We can reach even the threshold level of battling it out, only when we are able to appreciate where we are positioned and the strategy we

THE DRDO DATA LEAK Read More »

DIGITAL SOFT STATE

Do states gain maturity in their nature of governance? What if the nature of governance had been faulty and it matured in the same mould. This may sound weird but this is the abyss large numbers of South Asian states have created for themselves. Down the memory lane, Gunnar Myrdal, Swedish economist and sociologist used

DIGITAL SOFT STATE Read More »

Scroll to Top