Cherian Samuel Publications

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
    • While the Wassenaar Arrangement has instant recall in nuclear circles, it has only recently become a source of turmoil in cybersecurity, after the US Bureau of Industry and Security published rules that are applicable to cyber technologies.

      July 20, 2015
      IDSA Comments
    • The pressing issues around cyberspace revolve around internet governance, cybersecurity and drawing up rules of the road for the new domain of cyberwar. While each of these is at a different stage in its evolution cycle, cyberspace itself is facing a watershed moment as insecurities mount. The fragmentation of cyberspace seems inevitable unless there is accelerated movement on resolving the fundamental issues of internet governance and cybersecurity that have been hanging fire for well over a decade.

      Strategic Analysis
    • While Asia is home to the largest number of internet users on the planet, there is comparatively little contribution from the region to the discussions on cybersecurity.

      March 31, 2015
      IDSA Comments
    • Effective cybersecurity calls for a close partnership between the government in its role as custodian of the nation’s security, and the private sector, in both roles of information infrastructure provider as well as the provider of many critical services.

      December 31, 2014
      IDSA Comments
    • Governments find themselves struggling to deal with the issue of cybersecurity. Given the current state of play in cybersecurity, it is not surprising that any discussion sooner or later ends up as a confusing mix of viewpoints on fundamental rights, privacy, law enforcement, human rights, globalisation and national security, thus leading to a gridlock.

      Monograph
    • The 300-page report has 46 recommendations offering drastic solutions while addressing many of the issues in the wake of the Snowden revelations. The Administration has already rejected a key recommendation; that since both the NSA and Cyber Command have conflicting functions, the NSA should be placed under civilian control and should be split from the Cyber Command.

      January 09, 2014
      IDSA Comments
    • Chairperson: Shri Kiran Karnik
      External Discussants: Brig Abhimanyu Ghosh and Col S Burman
      Internal Discussants: Lt Col Sanjiv Tomar and Shri Kapil Patil

      July 26, 2013
      Events
    • Advantage: How American Innovation Can Overcome the Asian Challenge follows a long line of books that tap into America's preoccupation with retaining its pole position as the repository of cutting edge technology, and the resultant dominance this offers it across the political, economic and military spectrum. These books are a subset within the wider pre-occupation of responding to the rise of the Asian powers, and a shift of the geopolitical centre of gravity from the Euro-Atlantic to the Asian landmass.

      Strategic Analysis
    • Even as imagined and real cyber security threats scale new heights, the story coming out of the recently concluded Second International Conference on Cyberspace in Budapest was one of a widening gulf between countries, notwithstanding the stated intent of bridging differences through dialogue.

      October 11, 2012
      IDSA Comments
    • The two recent malware attacks on energy companies in West Asia are particularly worrisome since they represent a rapid escalation in capabilities and intent on the part of the perpetrators.

      September 07, 2012
      IDSA Comments

    Pages

    Top