<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2506 to 2520.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/gni-annual-report-mentions-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india">
    <title>CIS in Top 50 Tech Blogs of India</title>
    <link>https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is on the 30th position among the top technology blogs in India. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;This was published by &lt;a class="external-link" href="http://www.rebateszone.com/top-50-technology-blogs-in-india"&gt;rebateszone&lt;/a&gt; on October 7, 2015.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Infographic courtesy: Renuka Thakur&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The world of tech blogs is getting bigger and bigger, by time people are getting more and more interested in tech related items, it’s the only reason why we have seen such significant surge in tech blogs during the past few years. So the query that becomes difficult with every minute passing is that which of the tech blogs are worth your time? To help you on this we have created a list of top 50 tech bloggers in India, These weblogs are written by pros in the field, you might find numerous lists on the internet on this particular topic but you won’t be able to find more thorough and handy list that this as we have handpicked each and every blog in this list, we have organized these blogs according to the quality of posts. The other lists that you can find on the internet are sorted according to Alexa rank or number of incoming links, they have just produced those listed for the purpose of forming a new post but this list is produced according to the quality. If you want to stay updated with technology related news, developments etc., then we would recommend you to follow the following 50 tech blogs regularly:&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th class="tg-fvov"&gt;Sr No.&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Website/Blog&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Facebook&lt;/th&gt;
&lt;th class="tg-fvov"&gt;Twitter&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;1&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.fonearena.com/"&gt;fonearena.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;165,050&lt;/td&gt;
&lt;td class="tg-14nr"&gt;34,583&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;2&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.alltechbuzz.net/"&gt;alltechbuzz.net&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;262,568&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,706&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;3&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.bgr.in/"&gt;bgr.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;143,145&lt;/td&gt;
&lt;td class="tg-14nr"&gt;190,922&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;4&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://telecomtalk.info/"&gt;telecomtalk.info&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;41,205&lt;/td&gt;
&lt;td class="tg-baqh"&gt;21,080&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;5&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.medianama.com/"&gt;medianama.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;11,238&lt;/td&gt;
&lt;td class="tg-14nr"&gt;241,121&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;6&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techulator.com/"&gt;techulator.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;9,703&lt;/td&gt;
&lt;td class="tg-baqh"&gt;238&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;7&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.infosys.com/"&gt;infosys.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;696,536&lt;/td&gt;
&lt;td class="tg-14nr"&gt;164,452&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;8&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.9lessons.info/"&gt;9lessons.info&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;23,945&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,499&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;9&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://phoneradar.com/"&gt;phoneradar.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;14,898&lt;/td&gt;
&lt;td class="tg-14nr"&gt;8,381&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;10&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.indianweb2.com/"&gt;indianweb2.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,738&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,427&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;11&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://techpp.com/"&gt;techpp.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;10,221&lt;/td&gt;
&lt;td class="tg-14nr"&gt;17,661&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;12&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://techlomedia.in/"&gt;techlomedia.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;16,578&lt;/td&gt;
&lt;td class="tg-baqh"&gt;6,452&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;13&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.techlila.com/"&gt;techlila.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;20,252&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,904&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;14&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techtricksworld.com/"&gt;techtricksworld.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;5,331&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,726&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;15&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.makingdifferent.com/"&gt;makingdifferent.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;7,424&lt;/td&gt;
&lt;td class="tg-14nr"&gt;—–&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;16&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.tipsclear.com/"&gt;tipsclear.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;687&lt;/td&gt;
&lt;td class="tg-baqh"&gt;15,007&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;17&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.hackpundit.com/"&gt;hackpundit.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;40&lt;/td&gt;
&lt;td class="tg-14nr"&gt;315&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;18&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.ampercent.com/"&gt;ampercent.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,056&lt;/td&gt;
&lt;td class="tg-baqh"&gt;413&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;19&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.nirmaltv.com/"&gt;nirmaltv.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;26,261&lt;/td&gt;
&lt;td class="tg-14nr"&gt;6,293&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;20&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://pitechnologies.org/"&gt;pitechnologies.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;7,965&lt;/td&gt;
&lt;td class="tg-baqh"&gt;49&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;21&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.seotechyworld.com/"&gt;seotechyworld.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;9,335&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,977&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;22&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.igt.in/"&gt;igt.in&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;12,997&lt;/td&gt;
&lt;td class="tg-baqh"&gt;666&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;23&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.hacktrix.com/"&gt;hacktrix.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;9,374&lt;/td&gt;
&lt;td class="tg-14nr"&gt;196&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;24&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://thebleg.com/"&gt;technodify.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;26,318&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,958&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;25&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://webtrickz.com/"&gt;webtrickz.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,906&lt;/td&gt;
&lt;td class="tg-14nr"&gt;907&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;26&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.wpxbox.com/"&gt;wpxbox.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;16,938&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,242&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;27&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.itechcode.com/"&gt;itechcode.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,666&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,749&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;28&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.techfishy.com/"&gt;techfishy.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;4,791&lt;/td&gt;
&lt;td class="tg-baqh"&gt;114&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;29&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.zensar.com/"&gt;zensar.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;7,269&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,778&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;30&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://cis-india.org/"&gt;cis-india.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;—–&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,795&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;31&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://robosoftin.com/"&gt;robosoftin.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;664&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,892&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;32&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://digitaldimensions4u.com/"&gt;digitaldimensions4u.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;3,079&lt;/td&gt;
&lt;td class="tg-baqh"&gt;583&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;33&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.campustimespune.com/"&gt;campustimespune.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,121&lt;/td&gt;
&lt;td class="tg-14nr"&gt;278&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;34&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://msystechnologies.com/"&gt;msystechnologies.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;325&lt;/td&gt;
&lt;td class="tg-baqh"&gt;455&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;35&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://techsplurge.com/"&gt;techsplurge.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;3,797&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,140&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;36&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.zensoftservices.com/"&gt;zensoftservices.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;203&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,499&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;37&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.iltb.net/"&gt;iltb.net&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;4,994&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,675&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;38&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://savedelete.com/"&gt;savedelete.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;19,978&lt;/td&gt;
&lt;td class="tg-baqh"&gt;10,728&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;39&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.minterest.org/"&gt;minterest.org&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,033&lt;/td&gt;
&lt;td class="tg-14nr"&gt;12,867&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;40&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://thepockettech.com/"&gt;thepockettech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;22,346&lt;/td&gt;
&lt;td class="tg-baqh"&gt;12,375&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;41&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.thetechbulletin.com/"&gt;thetechbulletin.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;2,522&lt;/td&gt;
&lt;td class="tg-14nr"&gt;1,292&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;42&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.mobientech.com/"&gt;mobientech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;525&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,359&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;43&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://www.directingit.com/"&gt;directingit.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;98&lt;/td&gt;
&lt;td class="tg-14nr"&gt;27&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;44&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://itpreneurpune.com/"&gt;itpreneurpune.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;1,356&lt;/td&gt;
&lt;td class="tg-baqh"&gt;76&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;45&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://freaksense.com/"&gt;codemink.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;5,021&lt;/td&gt;
&lt;td class="tg-14nr"&gt;196&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;46&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://udayarumilli.blogspot.com/"&gt;udayarumilli.blogspot.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;103&lt;/td&gt;
&lt;td class="tg-baqh"&gt;63&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;47&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://saadhvi.com/"&gt;saadhvi.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;56&lt;/td&gt;
&lt;td class="tg-14nr"&gt;44&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;48&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://www.taraspan.com/global/"&gt;taraspan.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;8&lt;/td&gt;
&lt;td class="tg-baqh"&gt;310&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-mtwr"&gt;49&lt;/td&gt;
&lt;td class="tg-mtwr"&gt;&lt;a href="http://cloudnowtech.com/"&gt;cloudnowtech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-14nr"&gt;145&lt;/td&gt;
&lt;td class="tg-14nr"&gt;55&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td class="tg-yw4l"&gt;50&lt;/td&gt;
&lt;td class="tg-yw4l"&gt;&lt;a href="http://keshavatech.com/"&gt;keshavatech.com&lt;/a&gt;&lt;/td&gt;
&lt;td class="tg-baqh"&gt;2,953&lt;/td&gt;
&lt;td class="tg-baqh"&gt;18,139&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Here is the Infographic for top 50 tech blogs in India:&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Techblog50.png" alt="null" class="image-inline" title="Techblog 50" /&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india'&gt;https://cis-india.org/internet-governance/news/rebateszone-october-7-2015-top-50-technology-blogs-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-14T06:24:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/gni-annual-report-mentions-cis">
    <title>CIS in GNI Annual Report</title>
    <link>https://cis-india.org/news/gni-annual-report-mentions-cis</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) joined the Global Network Intiative (GNI) in March 2012. Recently, GNI brought out its Annual Report. Sunil Abraham is quoted in it.&lt;/b&gt;
        &lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/CISGNI.png/@@images/386c032d-ef13-4f28-ae35-6aca5d3a0da8.png" alt="CIS-GNI" class="image-inline" title="CIS-GNI" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;&lt;span class="discreet"&gt;GNI participants Sunil Abraham - Centre for Internet and Society (second from left) and Cynthia Wong - Center for Democracy and Technology (right) at the Google Internet at Liberty 2012 Conference, May 23, 2012. Also pictured (left to right): Dunja Mijatovic´ - OSCE Representative on Freedom of the Media, Judy Woodruff (Moderator) - Senior Correspondent, PBS Newshour, Mohamed El Dahshan - writer, journalist.&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;span class="discreet"&gt;Credit: Tony Powell&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;An increasingly global network&lt;/h3&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"Technological  development happens too quickly for us to purely depend on govern­ment  regulation. Self-regulation has an important role to play in keeping up  with these rapid changes … we will influence GNI norms using our Indian  perspective."&lt;br /&gt;&lt;b&gt;Sunil Abraham&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  key objective for GNI is increasing its membership across all  constituencies with a focus on developing countries and emerging  markets. In 2012, GNI welcomed Azerbaijani press freedom organization the  Institute for Reporters’ Freedom and Safety as the global Internet  governance community gathered in Baku, Azerbaijan for the Internet  Governance Forum. Their participation, alongside other new civil society  participant, the Centre for Internet &amp;amp; Society based in Bangalore,  India represents a step toward further internationalizing the GNI  network. Other new members include the George Washington University Law  School and Christine Bader from the Kenan Institute for Ethics at Duke  University.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/gni-annual-report.pdf" class="internal-link"&gt;Click to read the GNI Annual Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/gni-annual-report.pdf" class="internal-link"&gt;&lt;span class="external-link"&gt; &lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="http://www.globalnetworkinitiative.org/newsandevents/CIS_Joins.php"&gt;Click to read the news&lt;/a&gt; of CIS joining the GNI in 2012&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/gni-annual-report-mentions-cis'&gt;https://cis-india.org/news/gni-annual-report-mentions-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-25T07:31:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet">
    <title>CIS highlights changes ushered in by the Internet</title>
    <link>https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet</link>
    <description>
        &lt;b&gt;As part of its fifth anniversary celebrations, the Centre for Internet and Society (CIS) has organised an exhibition showcasing its accomplishments, besides a series of talks by experts on the changes ushered in by the Internet. The exhibition will remain open till Thursday.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/cis-highlights-changes-ushered-in-by-the-internet/article4737997.ece"&gt;published in the Hindu&lt;/a&gt; on May 22, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, a talk will be held at 6 p.m. on “Cyber security, privacy  and surveillance”. Also, Laird Brown, strategic planner and writer, and  Purba Sarkar, associate producer with the cyber security film project,  will make presentations on cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The valedictory will have talks by Kannada writer Chandrashekar Kambar  on “Kannada in modern era”, while member of Kannada Software Committee  U.B. Pavanja will speak on “From palm leaf to tablet”. This will be  followed by a Carnatic music programme by Nirmita Narasimha. The CIS has  also invited the public to be its auditors by displaying its account  books and contracts, which shows how it has spent the Rs. 13.13 crore  received from donors. The exhibition is open from 10 a.m. to 8 p.m.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet'&gt;https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-05-22T06:06:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh">
    <title>CIS Cybersecurity Series (Part 24) – Shantanu Ghosh</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh</link>
    <description>
        &lt;b&gt;CIS interviews Shantanu Ghosh, Managing Director, Symantec Product Operations, India, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;“Remember
that India is also a land where there are a lot of people who are beginning to
use computing devices for the first time in their lives. For many people, their
smartphone is their first computing device because they have never had
computers in the past. For them, the challenge is how do you make sure that
they understand that that can be a threat too. It can be a threat not only to
their bank accounts, with their financial information, but even to their
private lives.”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its twenty fourth
installment of the CIS Cybersecurity Series.”&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.&lt;/p&gt;
&lt;p&gt;Shantanu Ghosh is the Managing Director of Symantec
Product Operations, India. He also runs the Data Centre Security Group for
Symantec globally.&lt;/p&gt;
&lt;iframe src="https://www.youtube.com/embed/dFN2_R0HzbA" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;strong&gt;This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development Research
Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-07-15T14:58:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle">
    <title>CIS Cybersecurity Series (Part 23) – Justin Searle</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle</link>
    <description>
        &lt;b&gt;CIS interviews Justin Searle, security expert, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"I think that people here in India, just like everywhere else, are broadening the areas where security can be applied. We see elsewhere, like in the United States and in Europe, that a lot of security researchers are starting to get into not just control systems, but also embedded devices and hardware and wireless... And we are seeing the same trends here in India as well. It is fun to see that growth and continual development, and not only that, but we are seeing security projects and research coming out of India, that's unqiue and fresh and contributing back to what originally came more from the United States and Europe."&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its twenty
third installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Justin Searle is the managing partner for Utilisec.
Utisix provides security services to the energy sector. They also assist oil,
water, gas, and manufacturing companies. Justin specializes in security
assessments and finding vulnerabilities in systems.&amp;nbsp;&lt;/p&gt;
&lt;iframe src="https://www.youtube.com/embed/ufOV8DXzQuA" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development
Research Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-07-15T14:44:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous">
    <title>CIS Cybersecurity Series (Part 22) - Anonymous</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous</link>
    <description>
        &lt;b&gt;CIS interviews a Tibetan security researcher and information activist, as part of the Cybersecurity Series. He prefers to remain anonymous.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"I
don't know technology but I am aware of the information people share with me.
So yes, they can track you down through your mobile phone. The last time I was
in Nepal, I met a westerner. We went to this restaurant and she asked me to
take the battery out of the phone. That was the first time I had heard of this
and so when I asked why she said that it is possible that people had followed
us and it has happened to other Tibetans in Nepal..."&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its twenty second installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube.com/embed/glsAFfj7tV4" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development Research
Centre, Ottawa, Canada.&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-07-13T13:40:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering">
    <title>CIS Cybersecurity Series (Part 21) – Gyanak Tsering</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering</link>
    <description>
        &lt;b&gt;CIS interviews Gyanak Tsering, Tibetan monk in exile, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;“I have three mobile phones but I use only one to exchange information to and from Tibet. I don't give that number to anyone and nobody knows about it. High security forces me to use three phones. Usually a mobile phone can be tracked easily in many ways, especially by the network provider but my third mobile phone is not registered so that makes sure that the Chinese government cannot track me. The Chinese have a record of all mobile phone numbers and they can block them at anytime. But my third number cannot be traced and that allows me to communicate freely. This is only for security reasons so that my people in Tibet don't get into trouble.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society presents its twenty-first installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gyanak Tsering is a Tibetan monk in exile, studying at Kirti Monastery, Dharamshala. He came to India in 1999, and has been using the internet and mobile phone technology, since 2008, to securely transfer information to and from Tibet. Tsering adds a new perspective to the cybersecurity debate and explains how his personal security is interlinked with internet security and mobile phone security.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/mqSw3cy7MEc?list=UUwD4YvZvns0xOedAnzt6CYA" width="560"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-06T05:08:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah">
    <title>CIS Cybersecurity Series (Part 20) – Saumil Shah</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah</link>
    <description>
        &lt;b&gt;CIS interviews Saumil Shah, security expert, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;blockquote class="quoted" style="text-align: justify; "&gt;&lt;i&gt;“If you look at the evolution of targets, from the 2000s to the present day, the shift has been from the servers to the individual. Back in 2000, the target was always servers. Then as servers started getting harder to crack, the target moved to the applications hosted on the servers, as people started using e-commerce applications even more. Eventually, as they started getting harder to crack, the attacks moved to the user's desktops and the user's browsers, and now to individual user identities and to the digital personas.”&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society presents its twentieth installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saumil Shah is a security expert based in Ahmedabad. He has been working in the field of security and security related software development for more than ten years, with a focus on web security and hacking.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/2V39K8y68mc?list=UUwD4YvZvns0xOedAnzt6CYA" width="560"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-06T05:03:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy">
    <title>CIS Cybersecurity Series (Part 14) – Menaka Guruswamy</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy</link>
    <description>
        &lt;b&gt;CIS interviews Menaka Guruswamy, lawyer at the Supreme Court of India, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;div&gt;&lt;em&gt;"The courts have rarely used privacy to stop the Indian state from getting into someone's business. So jurisprudentially, it is a weak challenge when you mount a rights based or a privacy right challenge against surveillance by the state. Because the answer of the state to that has always been, and as has been Obama's answer in the United States, that there are national security concerns. And usually national security will trump individual privacy."&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Centre for Internet and Society presents its fourteenth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Menaka Guruswamy practices law at the Supreme Court of India. She was a Rhodes Scholar at Oxford University, and a Gammon Fellow at Harvard Law School, and a gold medalist from the National Law School of India. She has law degrees from all three schools, with a focus on Constitutional Law and Public International Law.&amp;nbsp;Guruswamy has worked at the Office of the Attorney General of India, the highest office that represents the federal government of India in the Supreme Court of India.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
http://youtu.be/GCDD6Z-UrGI
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;iframe src="//www.youtube.com/embed/GCDD6Z-UrGI" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2014-07-21T10:39:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash">
    <title>CIS Cybersecurity Series (Part 13) - Pranesh Prakash</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash</link>
    <description>
        &lt;b&gt;CIS interviews Pranesh Prakash, lawyer and policy director with Centre for Internet and Society, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;div&gt;
&lt;div&gt;&lt;i&gt;"When it comes to things cyber we completely lose our sense of proportion. While killing someone by negligence only attracts two years of punishment, saying something that people can define "offensive" attracts even more under 66A of the Information Technology Act. Something that can be a nuisance, under the Criminal Laws, can attract up to six months punishment, whereas under the IT act, it is up to three years..." - Pranesh Prakash, lawyer and policy director, Centre for Internet and Society&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Centre for Internet and Society presents its thirteenth installment of the CIS Cybersecurity Series.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;Pranesh is a Policy Director with the Centre, and is a graduate of the National Law School of India University, Bangalore, with a degree in Arts and Law.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/gUDeTeQ6DAg" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2014-01-20T06:20:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra">
    <title>CIS Cybersecurity Series (Part 12) - Namita Malhotra</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra</link>
    <description>
        &lt;b&gt;CIS interviews Namita Malhotra, researcher and lawyer at Alternative Law Forum, Bangalore, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"In a strange mix of how both capitalism and state control work, what is happening is that more and more of these places that one could access, for various reasons, whether it is for ones own pleasure or for political conversations, are getting further and further away from us. And I think that that mix of both corporate interests and state control is particularly playing a role in this regard." - Namita Malhotra, researcher and lawyer, Alternative Law Forum&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its twelfth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;Namita Malhotra is a researcher and lawyer at Alternative Law Forum (ALF).&amp;nbsp;She has a keen interest in working on law, technology and media through legal research, cultural studies, new media practices and film making.&lt;/p&gt;
&lt;p&gt;ALF homepage: www.altlawforum.org&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/R9bSvrs5w74" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-11-18T10:03:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs">
    <title>CIS Cybersecurity Series (Part 11) - Anja Kovacs</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs</link>
    <description>
        &lt;b&gt;CIS interviews Anja Kovacs, researcher and activist, and director of the Internet Democracy, Project as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"Having the cyber security debate become more and more important was a real challenge for civil society. I think in part because many of us who were&amp;nbsp;focused&amp;nbsp;on human rights aren't necessarily techies. And so, when you have a conversation with a government bureaucrat,&amp;nbsp;and ask questions about the kind of decisions they decided to take, very often they will come up with a technical answer in response. And then, if you don't have that expertise, it is difficult to react. In the meantime though, I think it has become clear that this is one of the biggest issues in the internet field at the moment. It is also one of the big issues that is driving the desires of governments to have a bigger role to play in internet&amp;nbsp;governance. So it is an area that is unavoidable for activists. What has happened slowly is that we have come to realize that the first thing, as in most other areas, is not the technical details, but principles, and those&amp;nbsp;principles&amp;nbsp;are fairly similar to how they are in many other fields." - Anja Kovacs, Internet Democracy Project&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its eleventh installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS speaks to Anja Kovacs, director of the Internet Democracy Project. Her&amp;nbsp;work focuses on a wide range of questions regarding freedom of expression, cybersecurity and the architecture of Internet governance as they relate to the Internet and democracy. Anja is currently also a member of the of the Investment Committee of the Digital Defenders Partnership and of the interim Steering Group of Best Bits, a global network of civil society members.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;(Bio from internetdemocracy.in)&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Internet Democracy Project homepage:&amp;nbsp;http://internetdemocracy.in/&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;iframe src="//www.youtube.com/embed/uWH2oup6ND8" frameborder="0" height="315" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-10-15T15:25:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong">
    <title>CIS Cybersecurity Series (Part 6) - Lhadon Tethong</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong</link>
    <description>
        &lt;b&gt;CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;"In authoritarian states, and in this case, in Tibet, I think that every person that we can teach and pass knowledge to, that can help them stay out of jail, stay in the streets, for one, two, three days longer, one week longer, that is a valuable time of time and resources. And I think we cannot rely on only tools and technology solutions to protect people. I think we can't just rely on government policies at the highest levels, and on export controls... the approach to digital security has to be comprehensive and we have to engage citizens. And not just in cases like the Tibetans or for activists or for people living under repression, but for people in free and open societies too." -  Lhadon Tethong, Tibetan human rights activist.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its sixth installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS interviews Lhadon Tethong, Tibetan human rights activist. Lhadon is the Director of the Tibet Action Institute, where she leads a team of technologists and human rights advocates in developing and advancing open-source communication technologies, nonviolent strategies and innovative training programs for Tibetans and other groups facing heavy repression and human rights abuses.&lt;/p&gt;
&lt;p&gt;Link for Tibet Action Institute: &lt;a href="https://tibetaction.net/"&gt;https://tibetaction.net/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/RzlvdY_DAe8" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-01T09:54:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter">
    <title>CIS Cybersecurity Series (Part 5) - Amelia Andersdotter</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter</link>
    <description>
        &lt;b&gt;CIS interviews Amelia Andersdotter, member of the European parliament, as part of the Cybersecurity Series&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;"Normally a good security policy will also provide privacy to the citizen that is encompassed by the security policy. So things like encryption, for instance, bring a more secure communication, more private communication, where you are able to interact with other people on equal terms and you don't have to fear outside interference. And that is obviously good for both the individual and for security. But then of course, security policies can be framed in different ways. It depends on who you are trying to protect with the security policy. Are you trying to create a secure situation for a copyright holder, or are you trying to create a secure situation for a law enforcement officer, or for a private citizen?" - Amelia Andersdotter, member of European parliament.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its fifth installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;Amelia Andersdotter is a Member of the European Parliament for the Pirate Party in Sweden. She works with industrial policy in the parliamentary committee of Industry, Research and Energy and is a substitute member of the committees for international trade, INTA, and budget control, CONT. Amelia is the Patron of the European Parliament Free Software User Group (EPFSUG), and also works in the delegations for the Andean community and Korean peninsula.&lt;/p&gt;
&lt;p&gt;Amelia's website is: http://ameliaandersdotter.eu/&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/RPh7RF2dkcw" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-01T09:54:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin">
    <title>CIS Cybersecurity Series (Part 3) - Eva Galperin</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin</link>
    <description>
        &lt;b&gt;CIS interviews Eva Galperin, Global Policy Analyst at the Electronic Frontier Foundation (EFF).&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;"It is a vital tool for speaking truth to power. Unless you are able to speak anonymously, you are not really free to espouse unpopular ideas to people who have the power to do bad things to do... I think the value of anonymous speech vastly outweighs the difficulties that you can sometimes get into because people can speak anonymously. And on the whole, I think anonymity is worth protecting." - Eva Galperin, Global Policy Analyst at EFF. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its third installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS speaks to Eva Galperin, the Global Policy Analyst at the Electronic Frontier Foundation (EFF).She has worked for the EFF in various capacities for the last five years, applying the combination of her political science and technical background to organizing activism campaigns, and doing education and outreach on intellectual property, privacy, and security issues.&lt;/p&gt;
&lt;p&gt;EFF homepage: &lt;a href="https://www.eff.org/"&gt;https://www.eff.org/&lt;/a&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/BLtiuVX0nEM" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-01T09:55:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
