Search

Advanced Search

Cyber Governance

Showing 1 to 5 of total 331 records

Workshop on CollabFiles, eTaal and Secure Gov Intranet Organised at Shimla, Himachal Pradesh

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Dec 31, 2024

A one-day workshop on CollabFiles, eTaal and Gov.in Secure Intranet Web Portals was organized by NIC Himachal Pradesh on 10th December, 2024 at H.P. Secretariat Shimla for the officers of various Departments of Himachal Pradesh. During her speech, she focused on the importance of these eTools and...

Cyber Security Awareness Workshops for Government Officers Organised by NIC District Units in Himachal Pradesh

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Mar 15, 2024

A series of workshops on Cyber Security of Digital Assets and Critical Information Infrastructure have been conducted by NIC District Units in Himachal Pradesh at District Headquarters. The basic objective of these workshops is to make Government Officials, at higher levels, aware about the potential...

CEO Himachal Pradesh Launched Voter Sahayak Mobile App Developed by NIC District Shimla

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Nov 23, 2022

Before the Assembly Elections of Himachal Pradesh, a voter festival was organized by the District Election Officer, Shimla on October 14, 2022 at the historic Ridge Ground under voter awareness in the state. During this fair, Chief Electoral Officer, Himachal Pradesh, Sh. Maneesh Garg launched the...

Assam Chief Minister launches four NIC online Applications

Kavita Barkakoty, Assam asm-kavita[at]nic[dot]in
  |   Nov 17, 2022

Guwahati, November 14, 2022: Assam Chief Minister Dr Himanta Biswa Sarma on Monday launched Mission Basundhara 2.0, the National Generic Documents Registration System (NGDRS), e-Khazana and the Composite Land Transfer (Automutation)  in an official ceremony held at Shrimanta Sankardev...

One Day Symposium on Digital Transformation in Governance

Kavita Barkakoty, Assam asm-kavita[at]nic[dot]in
  |   Sep 1, 2022

One Day Symposium on Digital Transformation in Governance at Assam Administrative Staff College (AASC) on 24th August, 2022 24 Aug 2022 : A one-day symposium on “Digital Transformation in Governance ” was held at the Assam Administrative Staff College (AASC), Government of...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...