Search: For - breach

37 results found

Russia and North Korea's Partnership: A Rising Concern for Nuclear Non-Proliferation
May 02, 2025

Russia and North Korea's Partnership: A Rising Concern for Nuclear Non-Proliferation

Russia's role as an enabler of North Korea's nuclear ambitions risks undoing decades of work toward nuclear restraint

सिंधू जल करार तात्पुरता स्थगित: धोरणात्मक स्थगिती, कायदेशीर उल्लंघन नाही
May 02, 2025

सिंधू जल करार तात्पुरता स्थगित: धोरणात्मक स्थगिती, कायदेशीर उल्लंघन नाही

भारताचा "सिंधू करार स्थगित करण्याचा" निर्णय बदलत्या प्रव

सिंधु जल संधि पर अस्थायी विराम: रणनीति के तहत लिया गया निर्णय
May 01, 2025

सिंधु जल संधि पर अस्थायी विराम: रणनीति के तहत लिया गया निर्णय

सिंधु जल समझौते को स्थगित करके भारत ने तनाव बढ़ने का संके�

সিন্ধু চুক্তি ‘স্থগিত’: একটি কৌশলগত বিরতি, আইনি লঙ্ঘন নয়
Apr 30, 2025

সিন্ধু চুক্তি ‘স্থগিত’: একটি কৌশলগত বিরতি, আইনি লঙ্ঘন নয়

ভারতের সিন্ধু চুক্তি ‘‌স্থগিত’‌ পরিবর্তিত জোয়ারের ইঙ্গ

Indus Treaty in “Abeyance”: A Strategic Pause, Not a Legal Breach
Apr 28, 2025

Indus Treaty in “Abeyance”: A Strategic Pause, Not a Legal Breach

India’s “abeyance” of the Indus Treaty signals shifting tides: Can treaty law be used as a tool of strategic pressure without breaching internat

Silent battles, audible woes: The human cost of cyberattacks against critical infrastructure
Feb 21, 2024

Silent battles, audible woes: The human cost of cyberattacks against critical infrastructure

Ensuring the safety of the most vulnerable is the most pressing concern on our path towards a more secure cyberspace

उत्तर कोरियाच्या लष्करी शक्तीच्या प्रदर्शनाचा प्रादेशिक प्रभाव
Jan 20, 2024

उत्तर कोरियाच्या लष्करी शक्तीच्या प्रदर्शनाचा प्रादेशिक प्रभाव

प्योंगयांगने अलीकडील केलेल्या लाइव्ह-फायर ड्रिल्समुळे

North Korea's artillery fire and regional implications
Jan 09, 2024

North Korea's artillery fire and regional implications

Pyongyang’s recent live-fire drills could set in motion a series of events with far-reaching consequences for regional stability, diplomacy, and the

Post-Quantum Cryptography: The lynchpin of future cybersecurity
Dec 04, 2023

Post-Quantum Cryptography: The lynchpin of future cybersecurity

With the number of data breaches multiplying rapidly over the years, India must ensure the timely migration to PQC algorithms across all sectors, part

हमासचा हल्ला आणि इस्रायली सुरक्षा आस्थापनांचे अपयश
Oct 27, 2023

हमासचा हल्ला आणि इस्रायली सुरक्षा आस्थापनांचे अपयश

इस्रायली सुरक्षा आस्थापनेचे निरीक्षण इतर देशांसाठी एक �

International implications of hack-for-hire services
Aug 09, 2023

International implications of hack-for-hire services

If not tackled promptly, India’s reputation as a hotspot of the hack-for-hire industry could jeopardise its role as an upcoming leader in global cyb

Striking the right balance: AI, Aadhaar, and governance
Jun 12, 2023

Striking the right balance: AI, Aadhaar, and governance

Allowing AI to be trained on datasets like Aadhaar raises evident concerns. To address AI benefits and privacy concerns, the government must examine A

डेटा, निजता और महामारी: भारत में मेडिकल रिकॉर्ड्स का सबसे बड़ा डेटा उल्लंघन
Jan 16, 2021

डेटा, निजता और महामारी: भारत में मेडिकल रिकॉर्ड्स का सबसे बड़ा डेटा उल्लंघन

भारत में मरीज़ों की देखभाल से संबंधित प्रमुख हितधारकों द

Aadhaar breach is serious, but bigger challenge is a data and privacy protection law
Jan 05, 2018

Aadhaar breach is serious, but bigger challenge is a data and privacy protection law

Shrill debates will tighten Aadhaar. But finally it would need to situate itself within a larger framework, as part of wider rights.

Artificial Intelligence in Africa’s healthcare: Ethical considerations
Sep 09, 2019

Artificial Intelligence in Africa’s healthcare: Ethical considerations

Artificial intelligence (AI) can improve various aspects of healthcare. It can help reduce annual expenditure,[1] allow early detection of diseases, provide round-the-clock monitoring for chronic disorders, and help limit the exposure of healthcare professionals in contagious environments. The use of AI in healthcare systems in Africa, in particular, can eliminate inefficiencies such as misdiagnosis, shortage in healthcare workers, and wait and

Chinese Takeaway
Jul 25, 2012

Chinese Takeaway

With the World Bank punishing Bangladesh by withdrawing support to $3 billion multipurpose bridge over River Padma, Dhaka is hoping that China will step into the breach. Could India pit ch in too? Or Delhi and Beijing collaborate on a transformative economic venture in Banglade sh, setting a new basis for regional cooperation?

Ensuring Cyber Security in India’s Nuclear Systems
May 11, 2023

Ensuring Cyber Security in India’s Nuclear Systems

Cyber security should take centrestage in nuclear-policymaking. This brief evaluates the current state of cyber security in India’s civilian and military nuclear systems, as gleaned from both incidents of breach on-ground and analyses in the public discourse. It outlines the level of threats faced in this domain, and makes a case for the development of policy measures for an integrated cyber-nuclear security strategy.

India and International Sanctions: Delhi’s Role as a Sanctioner
Sep 26, 2013

India and International Sanctions: Delhi’s Role as a Sanctioner

Over the years, sanctions have emerged as a preferred foreign-policy tool for many States, especially in the West. Sanctions serve a number of purposes, including the application of economic and political pressure on specific governments with a view to change their stance on a particular issue. International organisations, throughout the 20th century, used sanctions to impose their positions. The League of Nations first imposed sanctions in 1921

Invest, Acquire, Dominate: The rise and rise of China tech
Nov 11, 2019

Invest, Acquire, Dominate: The rise and rise of China tech

In response to their experience of western colonialism, countries like China and India have sought to develop their own, indigenous and autonomous technology base. China, in the last 30 years, has succeeded in this endeavour, becoming a major manufacturing power and adopting policies to develop and market its own technologies. Such success, however, is not without critics. Developed countries, especially the US which is its principal trading part

Laboratory Biosafety in India: In Search of a Sound Regulatory Framework
Apr 09, 2024

Laboratory Biosafety in India: In Search of a Sound Regulatory Framework

In the biomedical field, laboratories must ensure biosafety while managing pathogens and microorganisms in order to protect personnel and the broader community against potential leaks and lab-acquired infections. Global standards provide a roadmap for the biosafety of laboratories, underscoring the importance of their design and equipment, personnel training, waste management, and communication in preventing potential biohazards from breaching co

Losing hearts and minds in Kashmir, the 'innovative' way
May 30, 2017

Losing hearts and minds in Kashmir, the 'innovative' way

Tomorrow, the use of human shields could become standard operating procedure. Instead of the difficult process of flushing out militants by armed assault, the army could line up civilians and use them to breach a position.

Strategy and tactics in Israel-Iran escalatory ladder
Apr 19, 2024

Strategy and tactics in Israel-Iran escalatory ladder

From Iran's perspective, Israel breached a critical threshold by attacking its diplomatic mission, which Tehran deemed its sovereign territory

This isn't just about Paytm — Laws on government access to data need to change
May 30, 2018

This isn't just about Paytm — Laws on government access to data need to change

The Cobrapost Paytm story highlights, perhaps more importantly, the inadequacy of the legal system in place when requesting data from online companies that collect vast quantities of information about their users.

To delete, or not to #deleteFacebook, that is the question
Mar 26, 2018

To delete, or not to #deleteFacebook, that is the question

Given the massive breach of faith by Facebook, it's unclear how long it will take to re-establish trust in their motives even if companies pledge to improve their data security systems and guidelines.

Uri attack: There are no military options that will give India the outcome it wants
Sep 19, 2016

Uri attack: There are no military options that will give India the outcome it wants

In Pathankot and again in Uri, we have seen the perimeter breached too easily.

Vulnerable in cyberspace
Dec 16, 2016

Vulnerable in cyberspace

The ‘Legion’ hacks expose the dire state of cybersecurity in India. Frequent data breaches will steadily erode the confidence of Internet users and deter them from using digital gateways

Yoon impeachment saga might be over, but South Korea remains a society divided
Apr 13, 2025

Yoon impeachment saga might be over, but South Korea remains a society divided

The Constitutional Court took almost 111 days to deliberate Yoon Suk Yeol’s case as it was tested from the standpoint of preserving the Constitution.

आयाराम-गयाराम थांबणार कसे?
Jul 14, 2019

आयाराम-गयाराम थांबणार कसे?

कर्नाटकात जो काही राजकीय गोंधळ झाला, तो पाहता देशातील पक्षबदल विरोधी कायद्याची अंमलबजावणी कमी उल्लंघनच जास्त आहे, हे स्पष्ट होते. 

महाभियोग प्रक्रिया संपली, तरी दक्षिण कोरिया विभाजितच
Apr 19, 2025

महाभियोग प्रक्रिया संपली, तरी दक्षिण कोरिया विभाजितच

घटनेचे रक्षण करण्याच्या मुद्द्यावरून यून सुक योल यांच्यावरील महाभियोग चालवण्यास घटनापीठाने सुमारे १११ दिवसांचा अवधी घेतला.