+91 9116117170

Tag: cybersecurity

Smart and Easy Ways to Protect Your Digital Life

By Chandan Singh 0 Comment June 8, 2017

Even though you don’t realize it, your identity is all over the internet. Whether you posted to an internet forum in 1996 or you ever endured a MySpace page, these details are still out there, in addition, to protect it. There are some quick and simple ways that you can protect your digital life: 1. […]

Eight Female Students Awarded By Cyber Security Scholarships

By Chandan Singh 0 Comment May 29, 2017

(ISC)²® and the Centre for Cyber Safety and Education awarded eight women scholarships to help support their undergraduate and graduate student cyber security studies. (ISC)²’s sponsorship with the Centre is part of a broader initiative to allow cyber security opportunities for ladies and girls. “By 2022 the cybersecurity workforce gap is expected to hit 1. 8 million […]

China’s new cyber security effective law

By Chandan Singh 0 Comment May 29, 2017

China, battling increased threats from cyber-terrorism and hacking, will adopt from Thursday a controversial law that requires strict data surveillance and storage for organizations employed in the country, the official Xinhua news agency said. The law, passed in November by the country’s largely rubber-stamp Parliament, strip online companies from collecting and selling users’ personal information […]

Mumbai Police To Have 4 New Cyber Cells Soon

By Chandan Singh 0 Comment May 23, 2017

Mumbai Police will soon be establishing four more Cyber Cells in the city. The state government has given their nod for creating four new Cyber Cells and has also sanctioned 186 posts of police personnel for these new cells. In addition, a Cyber Training Center will also be established up with a capacity of 100 […]

5 Stages in Cyber security By FTC for Law Enforcement Actions

By Chandan Singh 0 Comment May 16, 2017

The Federal Trade Commission (FTC) that explains how companies can leverage NIST’s Cybersecurity Platform and FTC’s own “Start with Security” guidelines to greatly improve security in their organization. In this article, we highlight the five key tenants from the framework and how they could have possibly prevented FTC action and penalties. The framework is composed […]

error: Content is protected by Cyberops !!