Search: For - -

36157 results found

Cyber Mercenaries: A Call to Action for the Quad
Sep 20, 2023

Cyber Mercenaries: A Call to Action for the Quad

This paper investigates, in the context of the Quadrilateral Security Dialogue or Quad, the burgeoning threats posed by cyber mercenaries acting as proxies for revisionist states bent on destabilising the institutions and societies of adversary nations. The paper offers essential definitions of what comprises cybersecurity threats, including cyber mercenaries, and delineates current trends. Drawing on open-source intelligence and insights from cy

Cyber Mercenaries: The Failures of Current Responses and the Imperative of International Collaboration
Dec 11, 2023

Cyber Mercenaries: The Failures of Current Responses and the Imperative of International Collaboration

Digital adoption, hastened globally by the COVID-19 epidemic, brought along with it both benefits and threats, including concerns of safety and security of the cyberspace. Current geopolitical dynamics, ongoing strategic and economic disputes, as well as attempts by authoritarian regimes to preserve power have allowed companies with malicious intent—known as ‘cyber mercenaries’—to develop and deploy offensive cyber capabilities. The tools

Cyber Security & Internet Governance
Jul 16, 2013

Cyber Security & Internet Governance

With both the goods FTA and services FTA in place, India is well set on the path of a comprehensive economic partnership with ASEAN. India, whose services sector contributes about 55% to the country's GDP, has been keen to sign the services FTA with ASEAN as it will help the Indian companies tap the ASEAN markets easily.

Cyber Sovereignty: In Search of Definitions, Exploring Implications
Aug 17, 2023

Cyber Sovereignty: In Search of Definitions, Exploring Implications

The increasing dependence on the internet across the spectrum is pushing some states to adopt measures to exert their sovereignty over cyberspace. Certain global events have also acted as a catalyst for states to pursue cyber sovereignty. The involvement of multiple stakeholders and the borderless character of the virtual world have made sovereignty a complex affair in this domain. This brief seeks to illuminate the concept of ‘cyber so

Cyber Space governance: Moscow and Beijing's efforts at the UN
Sep 05, 2013

Cyber Space governance: Moscow and Beijing's efforts at the UN

While the initiatives taken at the UN, including the draft code, could be viewed as a step forward, the clear differences in what the American and Russian sides seek to address through such a mechanism will remain a stumbling block.

Cybersecurity in an age of insecurity
May 31, 2018

Cybersecurity in an age of insecurity

Over the years, the variety and intensity of cyber attacks have multiplied exponentially, even as many states have been struggling to arrive at framework for cybersecurity.

Cybersecurity Threats in Online Gaming: Learnings for India
Jan 10, 2024

Cybersecurity Threats in Online Gaming: Learnings for India

This brief examines the rapid growth of the global online gaming industry and the consequent increase in cyber threats. Issues such as microtransactions, money laundering, and predatory practices by developers can stymie the industry’s growth potential if not addressed. Many countries’ current gaming-focused regulatory frameworks do not cover these challenges and will need to be revised. India—a significant gaming market—must also conside

CyberSpace governance: The American approach
Oct 04, 2013

CyberSpace governance: The American approach

The US has become more proactive in engaging with the international community to address cyberSpace challenges ever since the policy shift in 2009. However, it still maintains its opposition to the need for an international treaty to govern cyberSpace.

Dangerous reds
Feb 19, 2005

Dangerous reds

Although it would not be entirely false to suggest that Maoists have managed to capture the imagination of a large section of Nepalese society because of the widespread poverty and continued neglect by successive monarchs and political leadership, there are quite a few other, equally valid, reasons why Maoists have had a run of the Nepalese countryside.

Dangers of optimism: India needs to guard against turning complacent
Sep 03, 2019

Dangers of optimism: India needs to guard against turning complacent

An unshakable optimism about the long-term destiny of India's economy is counter-productive at moments of crisis

Dangers of the ISIS push in Iraq
Jun 17, 2014

Dangers of the ISIS push in Iraq

To arrest the spread of brutal Islamic State of Iraq and Syria, the US must go in with a limited military mission, thus aiding the process of bringing stability in Iraq and the region at large. However, it should not look at staying in Iraq for a long haul.

Darkening mood in Delhi over China
Jul 03, 2020

Darkening mood in Delhi over China

Opinions in New Delhi are hardening, even among sections of elite opinion-makers who are not seen as hyper-nationalists.

Darwinian world order: 2008 was different — there was global cooperation and no blame game about subprime origins
Apr 25, 2020

Darwinian world order: 2008 was different — there was global cooperation and no blame game about subprime origins

Given their own shoddy handling of the COVID-19 outbreak, Trump and the Republicans believe they must demonise China to win the November elections.

Dash for Gas: Opportunities & Challenges
Apr 17, 2023

Dash for Gas: Opportunities & Challenges

Fifty years after the first LNG tanker sailed from Mississippi to UK in 1959 natural gas has finally matured into a global commodity. Gas is no longer limited to being a regional resource or a continental resource.

Dash for Gas: Opportunities & Challenges
May 10, 2023

Dash for Gas: Opportunities & Challenges

Fifty years after the first LNG tanker sailed from Mississippi to UK in 1959 natural gas has finally matured into a global commodity. Gas is no longer limited to being a regional resource or a continental resource.

Data Empowerment and Protection Architecture: Concept and Assessment
Aug 12, 2021

Data Empowerment and Protection Architecture: Concept and Assessment

Free flow in data can unlock huge social and economic value in user data that is usually locked in silos. With this motivation, Data Empowerment and Protection Architecture (DEPA), a public-private endeavour, is being developed in India as a template for users to access and share their data on their terms. Not only does this form of data sharing promote competition, but it fosters innovation as well. This brief dissects the conceptual layers of D

Data localisation is no solution
Aug 03, 2018

Data localisation is no solution

The data protection bill is an opportunity for India to be a partner under the CLOUD Act