Cybersecurity

by Pranav M B last modified Aug 13, 2018 11:32 AM

Automated Facial Recognition Systems and the Mosaic Theory of Privacy: The Way Forward

by Arindrajit Basu, Siddharth Sonkar — last modified Jan 02, 2020 02:12 PM

Arindrajit Basu and Siddharth Sonkar have co-written this blog as the third of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?

Automated Facial Recognition Systems and the Mosaic Theory of Privacy: The Way Forward - Read More…

Automated Facial Recognition Systems (AFRS): Responding to Related Privacy Concerns

by Arindrajit Basu, Siddharth Sonkar — last modified Jan 02, 2020 02:09 PM

Arindrajit Basu and Siddharth Sonkar have co-written this blog as the second of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?

Automated Facial Recognition Systems (AFRS): Responding to Related Privacy Concerns - Read More…

Decrypting Automated Facial Recognition Systems (AFRS) and Delineating Related Privacy Concerns

by Arindrajit Basu, Siddharth Sonkar — last modified Jan 02, 2020 02:01 PM

Arindrajit Basu and Siddharth Sonkar have co-written this blog as the first of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?

Decrypting Automated Facial Recognition Systems (AFRS) and Delineating Related Privacy Concerns - Read More…

Cybersecurity Visuals Media Handbook: Launch Event

Dec 06, 2019 from 06:00 PM to 08:30 PM by Saumyaa Naidu

6th December | 6 pm | Centre for Internet and Society, Bangalore

Cybersecurity Visuals Media Handbook: Launch Event - Read More…

Draft Security Standards for The Financial Technology Sector in India

by Vipul Kharbanda — last modified Nov 18, 2019 09:51 AM

Information security standards provide a framework for the secure development, implementation and maintenance of information systems and technology architecture. This document includes draft information security standards, which seek to ensure that not only the data of users is dealt with in a secure and safe manner but also that the smaller businesses in the fintech industry have a specific standard to look at in order to limit their liabilities for any future breaches.

Draft Security Standards for The Financial Technology Sector in India - Read More…

Introducing the Cybersecurity Visuals Media Handbook

by Saumyaa Naidu and Arindrajit Basu — last modified Dec 06, 2019 09:29 AM
November 15, 2019

The need for intervention in the cybersecurity imagery in media publications was realised during a brainstorming workshop that was conducted by CIS with illustrators, designers, and cybersecurity researchers.

Introducing the Cybersecurity Visuals Media Handbook - Read More…

Guest post: Before cyber norms, let’s talk about disanalogy and disintermediation

by Pukhraj Singh — last modified Nov 18, 2019 10:14 AM
November 15, 2019

In a guest post in relation to CIS’s recently held roundtable onIndia’s cyber defense strategy, Pukhraj Singh looks at the critical fissures – at the technical and policy levels – in global normative efforts to secure cyberspace. By charting out the key vectors and power asymmetries among key stakeholders – both leading state actors and private actors like Microsoft – Singh posits that there is much to be done before we circumscribe cyber operations within legal strictures.

Guest post: Before cyber norms, let’s talk about disanalogy and disintermediation - Read More…

Document Actions