CYBER SECURITY

EMERGING NATIONS – ONLY WITH EMERGING TECHNOLOGIES

DailyPost 933 EMERGING NATIONS – ONLY WITH EMERGING TECHNOLOGIES Any developing nation’s aspiration is of becoming the next emerging nation, join the bandwagon of the developed and then stake claims to be a super power. Whether it is Japan of the yesteryear’s or Singapore or South Korea of today or the unfolding digital story of

EMERGING NATIONS – ONLY WITH EMERGING TECHNOLOGIES Read More »

INFORMATION WARFARE

DailyPost 877 INFORMATION WARFARE Resources, technology and strategy have been the critical ingredients of war. Having these strong, meant a clear advantage. A pitched battle even with different theaters of war, was war, as the conventional thinking goes. Then came war of attrition; long protracted ones, the iconic Cold War, Asymmetric Wars came into being

INFORMATION WARFARE Read More »

BIGGEST CYBER SECURITY LAPSE – HUMAN BEHAVIOR

DailyPost 816 BIGGEST CYBER SECURITY LAPSE – HUMAN BEHAVIOR Human brain believes in bringing down the cognitive load in decision making and that is ample reason why password retains itself as the most popular password for years now notwithstanding the news of hacking tsunami the world over. To add insult to injury 1234567 happens to

BIGGEST CYBER SECURITY LAPSE – HUMAN BEHAVIOR Read More »

BUSINESS SANS CONSCIENCE!

DailyPost 802 BUSINESS SANS CONSCIENCE! From Lehman Brothers to Rupert Murdock’s News of the World to Cambridge Analytica and Facebook gives us a convincing feeling that all is not well with the corporate world. The analogy of Cyber Security would be worthwhile at this point; 97% of the Fortune 500 companies have been hacked, the

BUSINESS SANS CONSCIENCE! Read More »

CYBER POWER OUTAGE

DailyPost 790 CYBER POWER OUTAGE Its not only elections that Russia hacked in the US, on March 15, 2018, US government released report that there was a massive Russian hacking campaign to “infiltrate America’s infrastructure”– like power plants, nuclear generators etc. They were able to collect sensitive data. Though there was not identifiable sabotage, it

CYBER POWER OUTAGE Read More »

COMPUTER BEHAVIOR

DailyPost 778 COMPUTER BEHAVIOR How conversant you are with computer behavior makes you the most safe. Computers in various forms have become a part of us a nd as fast we are able to make out a symptomatic aberration in the functioning of the system, the safer we are. In the Cyber Security scenario we

COMPUTER BEHAVIOR Read More »

Scroll to Top