-
Ask Vishy, the personal AI-assistant of Naavi for all your information on Naavi.org
-
Naavi
IICA Qualified Independent Director
-
DGPIN: 4PJ-7T8-FK8P: 12.94018310,77.55421020
-
Plus Code : WHR3+3P
Bing_site_search
Google_site_search
-
Recent Posts
Archives
Archives by Date
Search Results for: insurance
An Open Letter to Sri Modi on Cyber Insurance
18th September 2015 To Sri Narendra Modi , Honourable Prime Minister, Government of India Sub: “Cyber Insurance For All Netizens of India Dear Sir, One of the distinguishing features of the Governance model adopted by your Government is its reliance on technology. … Continue reading
Posted in Cyber Law
Leave a comment
Cyber Insurance Website launched
In pursuance of Naavi’s efforts to promote the concept of Cyber Insurance in India, Naavi has launched a dedicated website Cyber Insurance.org.in to discuss all issues of Cyber Insurance in India. Naavi considers Cyber Insurance an important developing field because … Continue reading
Posted in Cyber Law
Leave a comment
India Cyber Insurance Survey 2015 is set to close shortly. Add your views
The India Cyber Insurance Survey 2015 which tries to capture the views of the stake holders on what is the current status of the Cyber Insurance industry in India is, is shortly set to close. If you have not yet participated … Continue reading
Posted in Cyber Law
Leave a comment
Information Security and Cyber Insurance have a direct correlation
Key Findings of the Ponemon-2015 Data Breach Study…3 (In continuation of the earlier article..) The IBM sponsored Ponemon Institute’s study of Data Breach Cost across 11 countries, released recently has brought out several interesting aspects that are relevant to Information … Continue reading
Posted in Cyber Law
Leave a comment
Does Your Vehicle Insurance also provide you Cyber Insurance?
Cyber Security specialists have recently demonstrated how a commercially sold car can be effectively taken control of by a remote “Hacker” leading to disastrous consequences. This article in Washington Post graphically sketches how a hacker can cut off the engine or … Continue reading