Search

Advanced Search

Editorial Board

Patron Advisory Panel Zonal Editors
  • Shri I.P.S. Sethi

Editor-in-Chief

  • Shri Mohan Das Viswam
  • Shri Ajay Singh Chahal
  • Smt. Suchitra Pyarelal
  • Shri C.J. Antony
  • Shri Manie Khaneja
  • Shri Alok Tiwari
  • Smt. Kavita Barkakoty
  • Smt. Sushma Mishra
  • Smt. Nissy George
  • Shri Vinod Kumar Garg
Web Updates Print, Circulation & Dispatch  
  • Shri Hemendra Kumar Saini
  • UxDT Division
 

Informatics Correspondents

State Correspondent e-Mail ID
Andaman & Nicobar Gautam Gupta gautam.g at nic dot in
Andhra Pradesh Dr. Venkata Ramana V V v3r at ap dot nic dot in
Arunachal Pradesh

Debashish Nath

debasish.nath at nic dot in
Assam Kavita Barkakoty asm-kavita at nic dot in
Bihar Rajiv Ranjan rajiv.ranjan at nic dot in
Chandigarh Vivek Verma
Manraj Kaur
vivek.verma at nic dot in
manraj.kaur at nic dot in
Chhattisgarh Y V Shreenivas Rao yvsrao at nic dot in
Dadra & Nagar Haveli  S. A. Khuba sakhuba at nic dot in
Daman & Diu Utpal N Mehta utpal.mehta at nic dot in
Delhi Nittal Srinivas
Archana Sharma (NIC HQ)
nsrini at nic dot in
archana dot v at nic dot in
Goa Archana Nagvekar archana.nagvekar at nic dot in
Gujarat Amit Dinkerbhai Shah amit.shah at nic dot in
Haryana Deepak Bansal
Deepak Sawant
sio-hryat nic dot in
sawant.deepak at nic dot in
Himachal Pradesh Ajay Singh Chahal
Sandeep Sood
ajay.chahal at nic dot in
sood.sandeep at nic dot in
Jammu & Kashmir Abhay Kumar
Jit Raj
sio-jk at nic dot in
jit.raj at nic dot in
Jharkhand Prashant Belwarier prashant.b at nic dot in
Karnataka B P Srinivasan b.p.srinivasan at nic dot in
Kerala Susy M susy.m at nic dot in
Lakshadweep Basheer Ahammed P.K basheer.pka at nic dot in
Madhya Pradesh Sushma Mishra mishra.sushma at nic dot in
Maharashtra Sunita Ramkrishna Navare navare.sr at nic dot in
Manipur M. Budhimala Devi bmala at nic dot in
Meghalaya Candida B.M. Booth Shadap candida.shadap at nic dot in
Mizoram Lalruatmawia Zadeng lr.zadeng at nic dot in
Nagaland T. Y. Sangtam
Novotsono Natso
tysangtam at nic dot in
novotsono.natso at nic dot in
Odisha Hara Prasad Das hp.das at nic dot in
Puducherry N.S. Kumaran ns.kumaran at nic dot in
Punjab Vikram Jeet Grover
Sarbjeet Singh
Parminder Kaur
grover.vikram at nic dot in
singh.sarbjeet at nic dot in
parminder.kaur at nic dot in
Rajasthan Amit Agarwal amit.agarwal at nic dot in
Sikkim Dr. Laxmi Prasad Sharma lp.sharma at nic dot in
Tamil Nadu Beena C beena.tn at nic dot in
Telangana ..... .....
Tripura Chayan Kanti Dhar
Chaitali Bhattacharjee
chayan at nic dot in
chaitali.b at nic dot in
Uttaranchal AK Dadhichi ak.dadhichi at nic dot in
Uttar Pradesh Anshu Rohatgi anshu.rohatgi at nic dot in
West Bengal Motiur Rahaman motiur at nic dot in

 

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...