Introduction The imperative of operationalizing the concepts of Cyber Deterrence and Active Defence for defending our national cyberspace was highlighted in the first part of this blog. It was further… Read more »
When it comes to cyber security in and of our country, there is a lot to achieve. This write-up attempts to discuss some of the issues which have strategic significance… Read more »
The World Wide Web is replete with news stories and analyst reports of data leakage and theft ostensibly by ‘trusted’ employees leading to irreparable loss of brand trust and the inevitable lawsuit and resultant fines. How do you secure your precious data against such loss? Here are four steps that every data security practitioner needs to be aware of.
Many organizations have recognized that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into everyday… Read more »
With Digital India initiative, there is a new wave of transformation across country. It include e-Governance, electronic delivery of services, and information to all in electronic form in the central… Read more »
This blog is more focused on the security threats exposed and experienced by beginners, infrequent internet users or those who spend much time on social network without appropriate security concerns. As part of a series, this is the first blog post.