Skip to content

Technology

lowrest

Cyber Ranges – Need Of The Hour

Subhasish Writes: The need for cyber security in the present scenario of cyber threats can never be overstated. The scale and complexity of attacks is rising and there is an urgent requirement to face up to emergent threats.

encryption

The Elusive National Encryption Policy

Subhasish writes draft National Encryption Policy (NEP) was formulated by an Expert Group set up by Department of Electronics and Information Technology (DeitY) and was released in Sep 2015 for comments and suggestions from the public. However, the draft was withdrawn as some of its provisions were criticised by activists and experts. Even after two years DeitY is yet to release a new draft of the policy.

f02f8f9d991c70417370a71b0a2d722d

Russian Hacking of US Elections : Larger Issues at Stake

Anurag Dwivedi writes: Failure of US to attribute the Russian hacking will have a major bearing on evolution of global cyber norms and on the global cyber arms race. The global community must simultaneously remain extremely wary of hidden American agendas. An Iraq like invasion on false cyber pretexts is even more undesirable then a cyber arms race.