Latest news

Javed Akhtar on confronting social media trolls and film legacy

Javed Akhtar on confronting social media trolls and film legacy

Controversial poster stirs political storm in UP

Controversial poster stirs political storm in UP

Census update: Government to track caste

Census update: Government to track caste

Global stock market indices: How the world markets performed today - 30 April 2025

Global stock market indices: How the world markets performed today - 30 April 2025

Teen suffers burns in Smart TV explosion in Kerala

Teen suffers burns in Smart TV explosion in Kerala

Indian stock market sector-wise performance today - April 30, 2025

Indian stock market sector-wise performance today - April 30, 2025

Top 5 Nifty 50 gainers today – April 30, 2025: Biggest stock moves

Top 5 Nifty 50 gainers today – April 30, 2025: Biggest stock moves

NSE Nifty 50: Top 5 stock losers of April 30, 2025

NSE Nifty 50: Top 5 stock losers of April 30, 2025

Decoding Cyber Sovereignty with Pukhraj Singh

Video Player is loading.
Current Time 0:00
Duration 0:00
Loaded: 0%
Stream Type LIVE
Remaining Time 0:00
 
1x
    • Chapters
    • descriptions off, selected
    • captions off, selected

      Interview by Bharath Pottekkat
      Edited by Malavika VN

      The past few years have witnessed a change in the way countries attempt to govern the vast, deep and decentralized cyber space. In the midst of large-scale disinformation campaigns threatening the very existence of public institutions, this need to govern stems from very real issues. Yet, the way we choose to do it is as vital in order to maintain the social contract between our society and the State. Regulations without a profound understanding and examination of the workings and meaning behind the cyber realm could leave us in a dire position. With this in mind, in this interview, we speak to Pukhraj Singh to explore four key questions that are critical to both our virtual and physical existence in the backdrop of national sovereignty based cyber regulations. These are as follows:

      1. What is cyber sovereignty? What are the different models that exist?

      2. What is the relationship between cyber sovereignty & the State?

      3. What has India dealt with cyber sovereignty?

      4. What is the role of data localization in cyber sovereignty?

      Pukhraj Singh is a cyber threat intelligence analyst who has worked with Government agencies, global response teams and start-ups in Canada, Israel, India, Malaysia and the US.

      ADVERTISEMENT

      Up Next

      Decoding Cyber Sovereignty with Pukhraj Singh

      Decoding Cyber Sovereignty with Pukhraj Singh

      Coronavirus in India: things you need to know

      Coronavirus in India: things you need to know

      How safe do women feel going to college in Delhi?

      How safe do women feel going to college in Delhi?

      Out of breath: the Bhalswa landfill

      Out of breath: the Bhalswa landfill

      What Does the Future of TV News Behold? With Vikram Chandra (Part 1)

      What Does the Future of TV News Behold? With Vikram Chandra (Part 1)

      Technically Speaking, How Can I Safeguard My Online Data & Information

      Technically Speaking, How Can I Safeguard My Online Data & Information

      ADVERTISEMENT

      editorji-whatsApp

      More videos

      Technically Speaking, When Can Law Enforcement Seize My Phone?

      Technically Speaking, When Can Law Enforcement Seize My Phone?

      Technically Speaking, Does India Use Predictive Policing? (Ep. 2)

      Technically Speaking, Does India Use Predictive Policing? (Ep. 2)

      Technically Speaking: Can You Predict Crime? (Ep. 1)

      Technically Speaking: Can You Predict Crime? (Ep. 1)

      Mapping Cyber Security in India with Pukhraj Singh

      Mapping Cyber Security in India with Pukhraj Singh

      Are Anganwadis Equipped to Handle Early Childhood Care & Education?

      Are Anganwadis Equipped to Handle Early Childhood Care & Education?

      Do Applications Pose a Threat to Cyber Security? With Pukhraj Singh

      Do Applications Pose a Threat to Cyber Security? With Pukhraj Singh

      The State Of Facial Recognition In India

      The State Of Facial Recognition In India

      Building COVID-19 Resilience in Education with Kavita Anand

      Building COVID-19 Resilience in Education with Kavita Anand

      How Do Internet Shutdowns & Web Censorship Work in India?

      How Do Internet Shutdowns & Web Censorship Work in India?

      Early Childhood Care & Education in the NEP 2020 with Kamal Gaur

      Early Childhood Care & Education in the NEP 2020 with Kamal Gaur

      Editorji Technologies Pvt. Ltd. © 2022 All Rights Reserved.