… digitisation and connectivity of CII have introduced new vulnerabilities and risks to threaten the resilience of essential services ... requires a comprehensive and coordinated safeguard of such infrastructures against cyber threats by a collecti
… digitisation and connectivity of CII have introduced new vulnerabilities and risks to threaten the resilience of essential services ... requires a comprehensive and coordinated safeguard of such infrastructures against cyber threats by a collecti
…. These personalities were intellectual giants in their respective fields … they were willing to accommodate each others, views for the larger goal of India's scientific development … more than 100 years back, foresight of these greats rem
… Biden said that President Vladimir Putin “has never seen sanctions like the ones I promised will be imposed if he moves”... “If they actually do what they’re capable of doing with the forces amassed on the border, it is going to be a disa
… effective cyber deterrence policies require regular, sustained disruption of malicious cyber activity. Such disruption can be technical, legal, logistical, financial, diplomatic, and, in some extreme cases, kinetic. Increasing the scope, scale an
… cyber weapons will be used individually and blended simultaneously with conventional kinetic weapons as force multipliers … for both attacker and defender, it is difficult to predict; cyber weapons often achieve things other than their intended
… it would be important for the Indian government to assess how China could ‘weaponize’ its control over trans-boundary waters and potentially ‘choke’ the Indian economy … there are different opinions about the impact of the proposed dams
… With its growing assertiveness in the international arena, China uses new technologies to achieve its foreign policy goals and project an image of responsible global power … spending billions on influence operations across the world ... fits i
… creation of the theatre commands and the PLA’s emphasis on joint operations have catalysed the Rocket Force’s focus on jointness…. integrating Rocket Force units into dual-use missile systems and the possible collocation of conventional an
China feels that U.S. is its main adversary ... China is trying to match U.S. technological capabilities with its own strength in AI as a leap frog technology and a new concept of war ... But there will be lot of problems in implementing this concept
… India is among the top three countries in the world after the U.S. and China when it comes to phishing and malware attacks ... While governments can’t control every aspect of cyber security, they can certainly help shape the future of cyber se