Cyber Security
The Curious Case of Huawei

China’s journey from being an agrarian economy to one of the largest economies with a strong military and cyber capabilities is commendable. However, its military and cyber capabilities are built upon relentless efforts to steal critical military a....

International Security: Review of 2020 & Projections for 2021

The year 2020 shall be recorded as an unprecedented year in the modern history of humankind. The outbreak of China-origin Coronavirus (also known as COVID-19) has eclipsed the events in global security. On one side, the spread of coronavirus enforced....

The New National Security Directive will Strengthen Telecom Security

In a landmark decision, the Cabinet Committee on Security has taken steps to strengthen the security of telecom networks in India.1 Henceforth, it will be mandatory for the telecom network providers to use only ‘trusted products’ from....

Vimarsh on India's Digital Leap by Shri Ram Sewak Sharma, Former Chairman of the Telecom Regulatory Authority of India

India’s economic growth is accelerating at a steady pace with a glimpse of its true potential to become the world’s fastest-growing economy soon. In 2019, India ranked as the second-largest online market, after China. According to data by Stat....

Lockdown Scenario- A Golden Opportunity for Cyber Criminals

“Anyone who thinks that security products alone offer true security is settling for the illusion of security.”1 - Kevin D Mitnick
The emergence of Coronavirus (hereafter COVID-19) and its rapid spread has em....

Cyber Wargame - An Indian Scenario

Introduction
Immediately after the first gulf war in the early 1990’s the theories of Revolution in Military Affairs (RMA) and Information Warfare were being studied all over the world as a new kind of warfare. During that time, a cours....

India's Strategies for Information War & Cyber Deterrence

The concept of Information Warfare (IW) is as old as warfare itself but has gained in significance in recent times where we look at non-contact battles between two adversaries. This concept involves the use of information and communication technologi....

Pegasus— A Powerful Tool of WhatsApp Surveillance

The Facebook’s subsidiary company—WhatsApp, on 29 October 2019, filed a lawsuit in the United States California’s Northern District Federal Court against Israel-based cyber-arms1 firm— the NSO Group, for infecting ‘specific’ gr....

Shielding the Future Generation from Adverse Effects of Cyber Penetration

(This is an updated version of the Valedictory Address given by the author during the Responsible Netism 4th National Cyber Psychology Conference 2020 on ‘Child Online Protection’ organized by Ahaan Foundation and Cyber Peace Foundation at Pun....

Cyber Enabled Information Warfare: Are Cyber Borders the Solution We Seek?

… U.S election is one of the recent examples of the threat due to information warfare ... cyber borders similar to the treaty of Westphalia can result into a system where the progress of nations due to cyber connections is maintained and at the sa....

Contact Us