-
Ask Vishy, the personal AI-assistant of Naavi for all your information on Naavi.org
Naavi

IICA Qualified Independent Director

-

-
DGPIN: 4PJ-7T8-FK8P: 12.94018310,77.55421020
-
Plus Code : WHR3+3P
Bing_site_search
Google_site_search
-
Recent Posts
- Towards a Resilient Pan-India Cyber Framework: Private Sector Cyber Defence Authority (PSCDA)
- IN-CRA: Need for integration of Private Sector into the Unified Command Structure
- IN-Cyber Resilience Act… Where should it start
- What should be the focus of Indian Cyber Resilience Act?
- EU Cyber Resilience Act could trigger another Compliance drive for Tech Exporters
Archives
Archives by Date
-
-
Author Archives: Vijayashankar Na
Is DDOS a legitimate form of Protest?
The Anonymous group which is known for several DDOS attacks around the world has petitioned Mr Obama that DDOS should be recognized as a legitimate form of protest. The group has claimed that DDOS is not a form of “hacking” … Continue reading
Posted in Cyber Crime, Cyber Law, Privacy
Leave a comment
Delhi Court issues summons to US Companies
Delhi Metropolitan Magistrate Court has issued summons to 11 US based websites including Facebook and Google for promoting enmity and undermining national integrity. The MHA has been asked to serve the notices. Other websites who will be summoned include Orkut, … Continue reading
Posted in Cyber Crime, Cyber Law, Uncategorized
Leave a comment
In US, SSN is being removed from Medicare records…
A bill is being passed in US to de-link Social Security Number from medicare ID cards. This is being pushed to avoid Medicare identity theft. Report The decision follows the observation that medicare security breaches are resulting in loss of … Continue reading
Posted in Uncategorized
Leave a comment
Dutch Responsible Disclosure Guideline..organizational responsibilites
In continuation of the earlier posts, following are the obligations that the Dutch National Cyber Security Council has imposed on the owners of systems. According to the guidelines it is necessary for the organization to have a policy on” Responsible … Continue reading
Posted in Cyber Crime, Information Assurance, Uncategorized
Leave a comment
Free CEAC support for Ethical Hackers reporting vulnerabilities
I refer to the earlier post where the Disclosure guidelines for Ethical Hackers suggested by the Government of Netherlands when they observe vulnerabilities. (The original Dutch version guideline is available here:: English Version) One of the suggestions made there in … Continue reading
Posted in Uncategorized
Leave a comment
The Dilemma of Advertising on Internet
Advertisements on the Internet are increasingly attracting attention of the public. No doubt that advertisers using innovative advertising techniques are mainly responsible for this attention. But a news about a French ISP blocking advertisements by default through its routers has … Continue reading
Posted in Cyber Crime, Privacy, Uncategorized
Leave a comment




