Search

Advanced Search

DDG, NIC, reviews operations at NIC Rajasthan, encourages officers to be vigilant towards cyber threats

Amit Agarwal, Rajasthan amit[dot]agarwal[at]nic[dot]in
  |   Sep 5, 2019
Dr. Ranjana Nagpal, DDG and Rajasthan State Coordinator, taking review meeting of Senior Officers
Dr. Ranjana Nagpal, DDG and Rajasthan State Coordinator, taking review meeting of Senior Officers

Dr. Ranjana Nagpal and Shri Tarun Toshniwal, SIO, in a meeting with the District Collector
Dr. Ranjana Nagpal and Shri Tarun Toshniwal, SIO, in a meeting with the District Collector

Dr. Ranjana Nagpal, Deputy Director General and Rajasthan State Coordinator, NIC, made a two-day visit to NIC Rajasthan starting 29th August 2019 and held a review meeting with the Senior Officers to take account of e-Governance activities in the state and the projects implemented by NIC Rajasthan.

Exhorting Group Leaders to take cyber security issues seriously, she said that any software should only be deployed after completion of security audit. All developers working on the projects should be properly trained about the security vulnerabilities so that safe code may be developed. Shri Tarun Toshniwal, Deputy Director General and State Informatics Officer, NIC Rajasthan, informed her about progress of important projects and the new initiatives taken. 

Dr. Ranjana Nagpal, along with Shri Tarun Toshniwal, also met Shri D.B. Gupta, Chief Secretary, Rajasthan, and apprised him of the important e-Governance projects of NIC, which may be useful for the state. She also acquainted him with Agriculture Projects and Centralize Web Applications developed by NIC Delhi.

She also visited Sikar district, along with Shri Tarun Toshniwal, to review progress of district activities. In a meeting with Shri C. R. Meena, District Collector, they informed him about important role played by NIC and discussed various e-Governance projects implemented in the district. Dr. Nagpal advised the District Collector to seek assistance of NIC in sensitizing the officials on critical projects such as PM Kisan and others. She said any suggestions or requirement of innovations may be incorporated. The Collector assured that necessary directions and instructions will be given to district agriculture officers for proper use of IT web applications developed by NIC. He was also made familiar with various other applications of NIC including DARPAN DM Dashboard.

Dr. Ranjana Nagpal and Shri Tarun Toshniwal inspected Sikar Treasury Office and reviewed the IFMS project. A demonstration of live transactions on various modules of IFMS project was given by the Treasury Officer and his staff, and they conveyed their satisfaction with the system.  An interaction was also held with treasury officers working on IFMS project. 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...