-
Govt working to set up financial CERT to tackle cyber threats
-
by
Admin
—
published
Nov 25, 2017
—
filed under:
Cyber Security,
Internet Governance
IT secretary Ajay Prakash Sawhney says the government is getting the framework in place for financial CERT, which will be followed by other sectoral CERTs later.
Located in
Internet Governance
/
News & Media
-
Grooming the geek
-
by
Prasad Krishna
—
published
Feb 28, 2012
—
filed under:
Internet Governance
Generation 2.0, the iPad child, is enriched by technology, and many parents are embracing it wholeheartedly. But can technology transform the way a child’s abilities develop?
Located in
News & Media
-
Ground Zero Summit
-
by
Amber Sinha
—
published
Dec 22, 2015
—
last modified
Jan 03, 2016 06:06 AM
—
filed under:
Cyber Security,
Internet Governance
The Ground Zero Summit which claims to be the largest collaborative platform in Asia for cyber-security was held in New Delhi from 5th to 8th November. The conference was organised by the Indian Infosec Consortium (IIC), a not for profit organisation backed by the Government of India. Cyber security experts, hackers, senior officials from the government and defence establishments, senior professionals from the industry and policymakers attended the event.
Located in
Internet Governance
/
Blog
-
Ground Zero Summit 2014
-
by
Prasad Krishna
—
published
Nov 12, 2014
—
last modified
Dec 05, 2014 12:42 AM
—
filed under:
Internet Governance
Geeta Hariharan participated in this event organized by India Infosec Consortium on November 13 and 14, 2014 in New Delhi.
Located in
Internet Governance
/
News & Media
-
Growing Wikipedia: The India Chronicles
-
by
Prasad Krishna
—
published
Oct 14, 2011
—
filed under:
Internet Governance
Located in
News & Media
-
GSMA Research Outputs
-
by
Elonnai Hickok
—
published
Apr 04, 2015
—
last modified
Apr 06, 2015 02:18 PM
—
filed under:
GSMA Research,
Internet Governance,
Privacy
This is a collection of research under our GSMA project that we have undertaken in collaboration with Privacy International. The research has sought to understand different legal and regulatory aspects of security and surveillance in India and consists of blog entries and reports. Any feedback or comment is welcome.
Located in
Internet Governance
/
Blog
-
Guidelines for the Protection of National Critical Information Infrastructure: How Much Regulation?
-
by
Jonathan Diamond
—
published
Jul 31, 2013
—
last modified
Aug 01, 2013 04:48 AM
—
filed under:
Cyber Security,
Internet Governance,
Privacy
July has been a busy month for cyber security in India. Beginning with the release of the country’s first National Cyber Security Policy on July 2 and followed just this past week by a set of guidelines for the protection of national critical information infrastructure (CII) developed under the direction of the National Technical Research Organization (NTRO), India has made respectable progress in its thinking on national cyber security.
Located in
Internet Governance
/
Blog
-
Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act in India
-
by
Prasad Krishna
—
published
Jul 28, 2013
—
last modified
Aug 28, 2013 10:19 AM
—
filed under:
IT Act,
Internet Governance
The Research Center of Media and Communication at the University of Hamburg organized the Summer School 2013 at Hamburg, Germany from July 29 to August 2, 2013. Dr. Nishant Shah was a panelist in the session on "Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act in India".
Located in
News & Media
-
Habeas Data in India
-
by
Vipul Kharbanda and edited by Elonnai Hickok
—
published
Dec 10, 2016
—
last modified
Dec 10, 2016 04:01 AM
—
filed under:
Featured,
Habeas Data,
Internet Governance,
Privacy
Habeas Data is a latin word which can be loosely translated to mean “have the data”. The right has been primarily conceptualized, designed, ratified, and implemented by various nation-states in the background of a shared common history of decades of torture, terror, and other repressive practices under military juntas and other fascist regimes.
Located in
Internet Governance
/
Blog
-
Hack exposes Zomato's weak protection of customer data, say Cyber experts
-
by
Prasad Krishna
—
published
May 19, 2017
—
filed under:
Cyber Security,
Internet Governance,
Privacy
Online restaurant aggregator says it will beef up security after 17 million user details were stolen.
Located in
Internet Governance
/
News & Media