Search

Advanced Search

News

Showing 401 to 405 of 1441 records

The Ministry of Drinking Water and Sanitation in association with the Govt. of Haryana had organized the Swachh Shakti-2019 at Kurukshetra in Haryana on 12/02/2019 and event was presided by Hon'ble Prime Minister Shri Narendra Modi.   During the convention, Prime Minister had unveiled...

Shri Subhash Chandra Garg, Secretary, Department of Economic Affairs launched the DEA-eSamikSha portal in the Conference Room, Department of Economic Affairs, North Block, New Delhi, on 4th February 2019. Shri K. Rajaraman, Additional Secretary, senior officers of the Department were also present...

Best Performing State Award in e-Procurement (2017-2018) - Odisha Continued with its Top Slot

A. K. Hota, Odisha ak[dot]hota[at]nic[dot]in
  |   Feb 5, 2019

eGovernanace Journey of the decade has been eventful for State of Odisha and certainly significant  is its journey in eProcurement while bringing immense change in Public Procurement System. With "Govt. of Odisha"  selected as  One of the Best Performers  amongst...

eSamikSha, an online Monitoring and Compliance Mechanism has been developed by Cabinet Secretariat Informatics Division, to fast track the compliance of pending action points, proposal, targets, etc. of Various Ministry/Department/Organization/Agency of Govt. of India and Government of States and...

Hon'ble Chief Minister, Himachal Pradesh Interacts with Cabinet Ministers and Public during JanManch using NIC VC

Ajay Singh Chahal, Himachal Pradesh ajay[dot]chahal[at]nic[dot]in
  |   Jan 21, 2019

Sh. Jai Ram Thakur, Hon’ble Chief Minister, Himachal Pradesh interacted with 10 Cabinet Ministers of Himachal Pradesh on 6th January 2019 from Shimla, using NIC VC facility, during the Jan Manch program, which is held at Panchayat level, every first Sunday of the month, and is presided over...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...