You are here: Home
115 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry CERT-In's Proactive Mandate - A Report on the Indian Computer Emergency Response Team’s Proactive Mandate in the Indian Cyber Security Ecosystem
by tiwari published Nov 19, 2016 — filed under: ,
CERT-IN’s proactive mandate is defined in the IT Act, 2000 as well as in the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Function and Duties ) Rules, 2013 (CERT-In Rules, 2013) both of which postdate the existence of the organisation itself, which has been operational since 2004.
Located in Internet Governance / Blog
Blog Entry CII Conference on "ACT": Achieve Cyber Security Together"
by Kovey Coles published Jul 22, 2013 last modified Jul 26, 2013 08:17 AM — filed under: , ,
The Confederation of Indian Industries (CII) organized a conference on facing cyber threats and challenges at Hotel Hilton in Chennai on July 13, 2013. Kovey Coles attended this conference and shares a summary of the event in this blog post.
Located in Internet Governance / Blog
Blog Entry CIS contributes to the Research and Advisory Group of the Global Commission on the Stability of Cyberspace (GCSC)
by Arindrajit Basu published Jul 05, 2018 — filed under: , ,
The Global Commission on the Stability of Cyberspace (GCSC) is an initiative of the Hague Centre for Strategic Studies and the East West Institute that seeks to promote mutual awareness and understanding among various cyberspace communities. It seeks to develop norms and policies that advance the stability and security of cyberspace.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 6) - Lhadon Tethong
by Purba Sarkar published Jul 15, 2013 last modified Aug 01, 2013 09:54 AM — filed under: , , , ,
CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series
Located in Internet Governance
Blog Entry CIS Cybersecurity Series (Part 10) - Lawrence Liang
by Purba Sarkar published Sep 10, 2013 last modified Sep 10, 2013 08:31 AM — filed under: , , ,
CIS interviews Lawrence Liang, researcher and lawyer, and co-founder of Alternative Law Forum, Bangalore, as part of the Cybersecurity Series.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 11) - Anja Kovacs
by Purba Sarkar published Oct 15, 2013 — filed under: , , , ,
CIS interviews Anja Kovacs, researcher and activist, and director of the Internet Democracy, Project as part of the Cybersecurity Series.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 12) - Namita Malhotra
by Purba Sarkar published Nov 15, 2013 last modified Nov 18, 2013 10:03 AM — filed under: , , , ,
CIS interviews Namita Malhotra, researcher and lawyer at Alternative Law Forum, Bangalore, as part of the Cybersecurity Series.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 13) - Pranesh Prakash
by Purba Sarkar published Dec 31, 2013 last modified Jan 20, 2014 06:20 AM — filed under: , , , , , ,
CIS interviews Pranesh Prakash, lawyer and policy director with Centre for Internet and Society, as part of the Cybersecurity Series.
Located in Internet Governance
Blog Entry CIS Cybersecurity Series (Part 14) – Menaka Guruswamy
by Purba Sarkar published Jun 04, 2014 last modified Jul 21, 2014 10:39 AM — filed under: , ,
CIS interviews Menaka Guruswamy, lawyer at the Supreme Court of India, as part of the Cybersecurity Series.
Located in Internet Governance
Blog Entry CIS Cybersecurity Series (Part 20) – Saumil Shah
by Purba Sarkar published Aug 30, 2014 last modified Sep 06, 2014 05:03 AM — filed under: , , ,
CIS interviews Saumil Shah, security expert, as part of the Cybersecurity Series.
Located in Internet Governance / Blog