Cyber Security
Lockdown Scenario- A Golden Opportunity for Cyber Criminals

“Anyone who thinks that security products alone offer true security is settling for the illusion of security.”1 - Kevin D Mitnick
The emergence of Coronavirus (hereafter COVID-19) and its rapid spread has em....

Cyber Wargame - An Indian Scenario

Introduction
Immediately after the first gulf war in the early 1990’s the theories of Revolution in Military Affairs (RMA) and Information Warfare were being studied all over the world as a new kind of warfare. During that time, a cours....

India's Strategies for Information War & Cyber Deterrence

The concept of Information Warfare (IW) is as old as warfare itself but has gained in significance in recent times where we look at non-contact battles between two adversaries. This concept involves the use of information and communication technologi....

Pegasus— A Powerful Tool of WhatsApp Surveillance

The Facebook’s subsidiary company—WhatsApp, on 29 October 2019, filed a lawsuit in the United States California’s Northern District Federal Court against Israel-based cyber-arms1 firm— the NSO Group, for infecting ‘specific’ gr....

Shielding the Future Generation from Adverse Effects of Cyber Penetration

(This is an updated version of the Valedictory Address given by the author during the Responsible Netism 4th National Cyber Psychology Conference 2020 on ‘Child Online Protection’ organized by Ahaan Foundation and Cyber Peace Foundation at Pun....

The New EU Guidelines on 5G: Some Lessons for India

In September 2019, the European Union (EU) came up with a set of guidelines1 for the introduction of 5G communication technologies in the member countries. The guidelines are considered essential for security of 5G networks. Cyber securit....

Global Norms for Stable Cyber Space: How Effective without Secure Supply Chain and Attribution to Attackers?

The Global Commission on the Stability of Cyber Space (GCSC), set up by The Hague Center for Strategic Studies and East-West Institute (EWI) in March 2017, in the Munich Security Conference will shortly release its report on norms of responsible stat....

A Tale of two UN Resolutions on Cyber-security

In December 2018, the UN General Assembly (UNGA) adopted two important resolutions: 73/271 on ‘Developments in the Field of Information And Telecommunications in The Context of International Security’; and, 73/2662 on ‘Adv....

A Threat Looming Large: India must display Resolve and Unity

India is in transition in many ways: From agricultural to industrial to information age with constantly varying coincidence amongst them. There is transformation to digital economy, new tax regime, infrastructure development and extension of service....

Overdependence on ZTE in India

In 2008, ZTE, a China based telecom company, set up a research centre in India after starting operations in 2003. The sales revenue of the company at the time in India was 750 million USD compared to 100 million USD in 2004.1 By 2013, the ....

Contact Us