-
CENTRES
Progammes & Centres
Location
19 results found
खाजगी कंपन्या जेव्हा सायबर राजनैतिक क्षेत्रात प्रवेश क�
As private firms enter cyber geopolitics, state dominance online is eroding—reshaping power, legality, and the ethics of modern cyber warfare.
As India launched Operation Sindoor, cyberspace turned into a war theatre—with malware, disinformation, and digital offensives—marking a new front
As cyber operations blur with psychological warfare, India must build resilience not just in systems, but in narratives, perception, and public trust
The sabotaging of Hezbollah’s communication devices and the targeting of civilians has carried the consequences of cyber warfare to the physical rea
तकनीकी निगरानी में प्रगति के बावजूद प्रमुख जासूसी के अड्
नव्याने समोर उभ्या राहणाऱ्या आव्हानांना सक्रिय प्रतिसा
While the Indian Army’s emphasis on integrating advanced tools reflects a proactive response to evolving challenges, a broader transformation warran
International stability can be endangered if the fine points of how international law applies to cyber operations are not determined
Defensive cyber operations are necessary to protect a network. At the same time, Offensive Cyber Operations (OCOs) cannot be neglected in military planning and should get as much attention as defensive cyber missions. Given the massive requirements for investment in cyber military capabilities geared for OCOs, this paper makes a case for the importance of OCOs for India. It outlines a roadmap for New Delhi to achieve effective OCO planning.
With North Korean workers, particularly IT professionals, increasingly relocating to Russia, cyber operations are expected to escalate
This paper investigates, in the context of the Quadrilateral Security Dialogue or Quad, the burgeoning threats posed by cyber mercenaries acting as proxies for revisionist states bent on destabilising the institutions and societies of adversary nations. The paper offers essential definitions of what comprises cybersecurity threats, including cyber mercenaries, and delineates current trends. Drawing on open-source intelligence and insights from cy
Digital adoption, hastened globally by the COVID-19 epidemic, brought along with it both benefits and threats, including concerns of safety and security of the cyberspace. Current geopolitical dynamics, ongoing strategic and economic disputes, as well as attempts by authoritarian regimes to preserve power have allowed companies with malicious intent—known as ‘cyber mercenaries’—to develop and deploy offensive cyber capabilities. The tools
The public attribution of a cyber incident—undertaken coherently and underscored by robust decision-making—can be a useful tool for national security. India, thus far, has not publicly attributed any international cyber incident to a specific private perpetrator or nation-state. Studying the models framed by scholars based in other jurisdictions, this brief offers suggestions on how India can approach the issue of public attribution of cybera
North Korea is among the states that stand out for their often defiant behaviour, divergent from typical diplomatic niceties and non-compliant with widely accepted international liberal norms and rules. This ‘uniqueness’ is seen, for instance, in the country’s nuclear weapons development programme, which has been the object of global attention since the early 1990s. North Korea has now extended this behaviour to the cyber domain, marked by
Cyber war is a subject that is highly contested among strategists and experts. This brief assesses the impact of cyber operations against strategic targets and demonstrates that while cyber war is a real phenomenon, it is far from producing decisive outcomes. The cyberspace is a medium to conduct military operations and several countries have made investments in capabilities to both attack and defend against cyber-attacks. The brief evaluates the