Search

Advanced Search

News

Showing 101 to 105 of 1441 records

Bihar e-District Mission Mode Project through ServicePlus for EODB and EOL

Rajiv Ranjan, Bihar rajiv[dot]ranjan[at]nic[dot]in
  |   Oct 13, 2022

The e-District Project through ServicePlus is being executed by Department of Information Technology, Govt. of Bihar in coordination with Service Provider Departments and Bihar Prashasnik Sudhar Mission Society through ServicePlus software framework of NIC for providing govt. services to the citizen...

Launch of Voter Saathi Chatbot by Hon'ble Election Commission of India on CEO Himachal Website

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Oct 7, 2022

Hon’ble Election Commission of India, during the Himachal Pradesh visit from 22-Sep-2022 to 24-Sep-2022, launched the Voter Saathi Chatbot on the Chief Electoral Officer, HP website. Sh. Rajiv Kumar, Chief Election Commissioner and Sh. Anup Chandra Pandey, Election Commissioner launched this...

NIC Haryana executed Online Common Entrance Test (OCET)-2022 Project for admission to B. Pharmacy

Deepak Sawant, Haryana sawant[dot]deepak[at]nic[dot]in
  |   Sep 20, 2022

NIC Haryana executed Online  Common  Entrance Test (OCET)-2022  Project  for  admission  to  B. Pharmacy which consists of Online Registration, Online Fee Payment, Training & Demonstration to OCET centres, Admit Cards processing & publishing, Sample and actual...

Launch of Management Information System for Pong Dam Oustees at Kangra, Himachal Pradesh

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Sep 2, 2022

Sh. Nipun Jindal, IAS, Deputy Commissioner, Kangra launched the Management Information System for Pong Dam Oustees on 27th August 2022 at Dharamshala. Pong Dam is a large reservoir which has resulted in displacement of people from the State of Himachal Pradesh. Many people of Himachal Pradesh lost...

One Day Symposium on Digital Transformation in Governance

Kavita Barkakoty, Assam asm-kavita[at]nic[dot]in
  |   Sep 1, 2022

One Day Symposium on Digital Transformation in Governance at Assam Administrative Staff College (AASC) on 24th August, 2022 24 Aug 2022 : A one-day symposium on “Digital Transformation in Governance ” was held at the Assam Administrative Staff College (AASC), Government of...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...