The Information Communication Technology Act 2006 governs the cybersecurity and data protection landscape of Bangladesh, even before the Bank of Bangladesh was hacked in 2016. The broad media law to tackle issues that range from fake news, defam... Read more
[ad_1] “Social media rewards not morality or veracity but virality. Their design is a perfect engine for the fast and widespread of information, which makes them so wonderful. But there is a catch: unlike the truth, lies can be engineered to tak... Read more
[ad_1] “Social media rewards not morality or veracity but virality. Their design is a perfect engine for the fast and widespread of information, which makes them so wonderful. But there is a catch: unlike the truth, lies can be engineered to tak... Read more
[ad_1] 1. First Layer: Aggregate Cyber Robustness: The Cyber robustness is the ability of organization and process to continue operating despite a routine of cyber threats by repelling and preventing most of the attacks. The National Cybersecuri... Read more
The Group of Seven (G7) meeting in Paris highlighted some remarkable developments on geopolitics and economics of cyberspace. Usually, the group meets annually on summit sites to discuss economic policies. But this year, the meeting highlighted... Read more
Encryption is used to protect all our online transactions- both monetary and non-monetary. It is fundament to have strong encryption to secure our data online and keep our devices from ‘third party access’. Technically, encryption is an algorith... Read more
Part I Author: Sanjana Rathi A cyber weapon is an integration of software and hardware components such as clipper chip, microprocessor, and peripheral logical units. These different parts can be produced anywhere globally and assembled in a... Read more
By Sanjana Rathi When the policies of trade liberalisation was put forth, cybersecurity risks were not known to the policy-makers and therefore it was a parameter completely ignored. However, in recent years the cybersecurity... Read more
In International Relations, Cyberspace has become a significant focus. Cyber-espionage, cyberattack, hacktivism, internet censorship, and other technical issues get mentioned as national security issues, or in the news of diplomatic tension... Read more
The Group of Seven (G7) meeting in Paris highlighted some remarkable developments on geopolitics and economics of cyberspace. Usually, the group meets annually on summit sites to discuss economic policies. But this year, the meeting hi... Read more
Popular
Most Shared
Categories
- Uncategorized (10)
- Topics (8)
- Regions (5)
- Europe (2)
- North America (1)
- Latin America (2)
- Asia Pacific (4)
- Middle East (1)
- Africa (2)
- International (7)
- United Nations (2)
- Shanghai Cooperation Organisation (1)
- BRICS (2)
- Relations (2)
- Terrorism (1)
- Policy (7)
- National Security (3)
- Opinion (2)
- Business & Commerce (2)
- Strategy (5)
- Society (4)
- New Challenges (4)
- Cyber-Psychology (1)
- Blogs (5)
- Weekly Reports (20)