You are here:
Cyber
#

Cyber

Articles

Online trolling against women will be considered as violence: Maneka Gandhi

May 18, 2016

Online trolling against women will be considered as violence: Maneka Gandhi

Minister for Women and Child Development Maneka Gandhi expressed her concern over the “tremendous viciousness” that women have to deal with online and announced that cyber trolling would henceforth be considered as violence, according to a report by NDTV. #facebook #NewsTracker #Maneka Gandhi #UPSC #Cyber #Online trolling #Tina Dabi #cyber trolling
Top emergingdigital workplace technologies: Personal IoT, My Pet AI, Hackers Bench

Oct 26, 2015

Top emergingdigital workplace technologies: Personal IoT, My Pet AI, Hackers Bench

Workplaces can take advantage of their employees’ personal networks of beacons and sensors for scenarios such as smart badges, that show contextual digital signs... #Gartner #cloud #Cyber #AI #IoT #digital workplace technologies
PM Modi inaugurates 'Digital India Week', warns of cyber threats

Jul 01, 2015

PM Modi inaugurates 'Digital India Week', warns of cyber threats

Articulating global worries over cyber security, Prime Minister Narendra Modi on Wednesday said India should come up with solutions to meet the challenge posed by this threat of "bloodless war" as he launched a digital campaign to which top companies pledged Rs 4.5 lakh crore. #Narendra Modi #NewsTracker #e-governance #Cyber #Digital India Week
57 arrested in cyber crime operations in Britain

Mar 07, 2015

57 arrested in cyber crime operations in Britain

A total of 57 people were arrested across the Britain in a nationwide operation against cyber crime #London #Crime #Britain #Cybercrime #Cyber #NCA
CyberArk expands privileged account security solution to include SSH key management

Oct 24, 2014

CyberArk expands privileged account security solution to include SSH key management

CyberArk has introduced Secure Shell (SSH) key management with the release of version nine of the CyberArk Privileged Account security solution. According to the security-focused firm, users can now secure and manage SSH keys as well as other privileged credentials in a single, integrated platform to identify, manage and protect against advanced external attackers and malicious insiders. #Security ##CyberSecurity #Cyber #Key Management #SSH #CyberArk
Cannes Lions 2014: 14 Indian entries make it to Cyber, Design, Radio shortlists

Jun 17, 2014

Cannes Lions 2014: 14 Indian entries make it to Cyber, Design, Radio shortlists

Cannes Lions 2014 has announced its shortlists for the Cyber, Design, Product Design and Radio categories. While no Indian entries have been shortlisted for the inaugural Product Design category, a total of 14 entries have made the mark across the other three categories. #Google #Advertising #Nike #design #Google search #Cyber #Jaago Re #TATA Tea #JWT india #Ogilvy India #Radio #reunion #BBH India #cannes lions 2014 #shortlists #Product Design #Make Every Yard Count #22 Feet Tribal WW #Push the pin #CRY India
Cyber Attacks On Stock Exchanges Put Markets At Risk: Report

Jul 17, 2013

Cyber Attacks On Stock Exchanges Put Markets At Risk: Report

Around half of the world's securities exchanges were the target of cyber-attacks last year, according to a paper based on a survey of 46 exchanges. #markets #Stock exchange #cyber attacks #Cyber
Insider Threat: Source Of 70 Percent Of Data Breaches

Sep 17, 2010

Insider Threat: Source Of 70 Percent Of Data Breaches

Pratap Reddy, Director, Cyber Security-NASSCOM, speaks on trends in the cyber threats space, the IT Amendment Act 2008 and government's readiness to counter cyber threats. #Technology #Cyber #2008 #threat #BizTech News #IT Amendment Act #Insider Risk