Ramamohan Reddy Bommireddi
Hyderabad, Telangana, India
4K followers
500+ connections
View mutual connections with Ramamohan Reddy
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Ramamohan Reddy
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
About
DigitalTrust enables TRUST in the Digital Ecosystems of the governments and enterprises…
Experience
-
DigitalTrust Technologies Private Limited
Hyderabad, Telangana, India
Patents
-
OFFLINE vCARD
Filed US US 20130198284 A1
In accordance with an example embodiment a method and system for updating web-based sources associated with a user based on the monitored non-internet based activities in the offline real world are disclosed.
The method and system includes summarizing a plurality of attributes of a user, selecting a subset of attributes from the plurality of attributes, generating an offline-verifiable identity certificate (OVIC) based on the selected subset of attributes, issuing the offline-verifiable…In accordance with an example embodiment a method and system for updating web-based sources associated with a user based on the monitored non-internet based activities in the offline real world are disclosed.
The method and system includes summarizing a plurality of attributes of a user, selecting a subset of attributes from the plurality of attributes, generating an offline-verifiable identity certificate (OVIC) based on the selected subset of attributes, issuing the offline-verifiable identity certificate to the user, monitoring the non-internet based activities of the user, and updating the subset of web-based sources associated with the user.
The plurality of attributes is collected from web-based sources. The subset of the attributes is embedded in the issued OVIC and the non-internet based activities are associated with the issued OVIC. The web-based sources are updated based on the monitored non-internet based activities.Other inventorsSee patent
View Ramamohan Reddy’s full profile
Other similar profiles
-
Edward Sunil Joseph
ChengalpattuConnect -
Swapnil Patil
PuneConnect -
Sangram Patil
CEO & MD at S P Software Technologies (I) Pvt. Ltd
PuneConnect -
Vijay Wadhi
Senior Vice President - Finance & Operations
HyderabadConnect -
Mohan Kumar K R
Green Hydrogen | Collaboration | Adoption | Acceleration | Climate Action | Netzero | Energy Transition | Sustainability | Innovation | Green Hydrogen Ecosystem
BengaluruConnect -
Ashish Parmar
GandhinagarConnect -
Balaji Ganesh
CEO at Adrenalin eSystems Limited
ChennaiConnect -
Rishi Khiani
MumbaiConnect -
Madhu Aravind
BengaluruConnect -
Sudip Samaddar
Strategy
Greater Delhi AreaConnect -
Sanjay Bugnait
CEO & MD (owner) Core Competency Training & Services Pvt. Ltd
Delhi, IndiaConnect -
Rahul Jain
PuneConnect -
Niladri Dutta
BengaluruConnect -
Darpan Jain
Fort Lauderdale, FLConnect -
GK RAJU
Race2Cloud Technologies
BengaluruConnect -
Rivi Varghese
BengaluruConnect -
Shantanu Jha
Dubai, United Arab EmiratesConnect -
Vishal Aggarwal
NoidaConnect -
Shubho Bhattacharya
Partner and Microsoft Practice Leader at EY
BengaluruConnect
Explore more posts
-
Prof NK Goyal
*Cyber Security Association of India (CSAI) Industry Delegation meeting with DG Cert-In on 29th July 230PM* Lt. Gen. (Dr.) Rajesh Pant, Chairman CSAI, Former NCSC invites you for industry meeting with Dr Sanjay Bahl, DG Cert-In and share industry issues with him. Cybersecurity is one of the most important challenges faced by any Nation. Major Cyber-attacks have hit Critical Information Infrastructure of Nation. The world is more connected than ever before, but developments in cyber security levels are not matching the need for keeping the world safe. With every new device and emerging telecommunications development comes new vulnerabilities for exploitation. A point of vulnerability may exist in IoT, especially when a manufacturer may cut security features in the name of reducing costs. Based in past response from stakeholders, following agenda is proposed and we welcome comments/issues form all stakeholders for discussions in meeting: Challenges to be addressed in National Cyber Security Strategy. - Reporting incidents - Audit empanelment - CISO network - Threat intel - Cyber Swatchhta - Security ratings - Reporting - Review of Cyber Crisis Management Plan - Security Level Labelling to be mandated for IoT devices - Governance framework for ensuring secure by design A cheap consumer drone might sell on the basis of fun and convenience, it can also represent the ability to launch distributed denial-of-service (DDoS) attacks, to present advanced persistent threats (APTs), and to deploy ransomware. - Access Policy for use of IoT devices - Insider threat to be addressed more closely. - License the critical cyber security services. - Any other issue, if any. *If you are interested to join also, please confirm at [email protected] by 24th July 2024 4.00 PM. The selected delegates for personal meetings would be informed the venue of the meeting* All issues would be taken up. Prof NK Goyal, President CSAI what’s app 95 822 25882 [email protected] Navtesh ED & CEO CMAI/TEMA/CSAI What’s App 97 118 69771 [email protected]
292 Comments -
Topendra Bhattacharjee
Identity theft or Personal data breach - How can you mitigate 👣 👾 💥#fraudtech Cybercriminals exploit personal information like bank passwords, Aadhaar, PAN, or health data for illegal activities, including financial theft, ordering goods, or fraudulently claiming health insurance. Children's data is also at risk. Thieves may use or sell this data on the dark web, leading to financial loss, legal trouble, or reputational damage. As threats evolve, cybersecurity experts stress the need for comprehensive protection beyond antivirus software, including VPNs and safe browsing. Avoid clicking unknown links and be cautious of suspicious emails, messages, or pop-ups. The key to protecting yourself from identity theft is ensuring that your sensitive information remains secure. This applies whether the information is on paper, online, stored on your computer, or on a mobile device. Protect personal information - Identity theft can affect anyone, but you can minimize the risk by taking a few simple precautions to protect your personal information. To safeguard your sensitive information, begin by shredding documents such as receipts, credit offers, loan applications, insurance forms, and bank statements once they’re no longer necessary. Opt for a "cross-cut" shredder for the best security. Protect your online accounts by using strong, unique passwords for each one, and make sure to store them securely. Additionally, before selling, giving away, or disposing of any laptop, computer, or mobile device, ensure that you have completely erased all personal information to prevent identity theft or unauthorized access. Protect yourself Digitally - To protect your personal information, disable third-party trackers in your browser and use privacy-focused extensions. Download apps only from trusted sources like PlayStore or App Store, and limit app permissions to essential functions. Review website data collection policies before logging in. Utilize social media privacy settings, and enable two-factor authentication for financial accounts. Use secure networks, consider VPNs, and install cybersecurity software for extra protection. Avoid sharing sensitive details about children or seniors, and stay cautious of deals that seem too good to be true, as they may be scams. The 1930 helpline is a toll-free number operated by the Ministry of Home Affairs in India, designed for the immediate reporting of financial cyber frauds. The system enables citizens to report incidents of financial fraud related to digital banking, credit/debit cards, UPI, & other payment intermediaries. The helpline is part of the Citizen Financial Cyber Fraud Reporting and Management System, which is integrated with the National Cyber Crime Reporting Portal (https://cybercrime.gov.in). CyberDost #fraudalert #identitytheft #digitalfrauds #digitalbanking #safebanking #safetytips #CISO #cybercrime #indiadigitalfrauds #FraudPrevention #CyberSecurity #FinTech #fraudcontrol #safedigitalbanking
614 Comments -
Dr.Deepak Kumar Sahu
Despite these directives, the necessary infrastructure has not been fully established, and there have been multiple instances where headers and templates have been misused. Unfortunately, telecom operators have not taken sufficient steps to address these issues or trace the origin of the problematic traffic. It seems that telecom companies( airtel, Vodafone Idea Limited) play a significant role in the issue of spam calls, as they are responsible for issuing phone numbers to organizations. In the past, it was easier to identify telemarketing calls because they typically came from numbers associated with specific agencies. However, the situation has evolved, and now spam calls can originate from common numbers, even those starting with familiar sequences like 98102... or 98105..., making it more challenging to differentiate between legitimate and unsolicited calls. This shift has contributed to the growing frustration among mobile users, as spam calls have become more pervasive and harder to avoid. Hey Telcos, it's high time to stop profiting from selling databases containing personal identifiable information (PII) to organizations and enterprises. By ceasing the sale of phone numbers to marketing agencies, you can significantly reduce the influx of spam calls that plague users daily. This is a call to action for the Telecom Regulatory Authority of India (TRAI) to step in and address this pressing issue, ensuring better protection of consumer data and privacy. The responsibility lies with both telecom providers and regulators to take concrete steps toward curbing this nuisance.
2 -
ObserveNow
Dr. RAKESH JHA - FIP, Chief Compliance and Privacy Officer at Alliance Pro , delivered a compelling talk on achieving ethical standards in industry practices at the 3rd Edition of the ObserveNow PSU Summit & Awards in New Delhi. Dr. Jha highlighted the critical role of compliance, privacy, and integrity in fostering a culture of trust and accountability within organizations. His insights provided invaluable guidance on navigating the complexities of ethical governance in today's ever-evolving regulatory landscape. 𝐅𝐨𝐫 𝐦𝐨𝐫𝐞 𝐢𝐧𝐟𝐨: https://lnkd.in/gdzwewpd #ObserveNowPSU #ObserveNowPSUSummit #ObserveNowGovernance #PSUSummit #PSUSummit2024 #ObserveNowMedia #ITSector #NewDelhi #ITDepartment #CyberSecurity #GovernmentLeaders #Policymakers #DigitalIndia #ObserveNowEvents #PublicSector #PSUs #Stakeholders #DigitalTransformation #Manufacturing #Defence #DataSecurity #CMD #CISOs #CGM #IndustryLeaders #OilandGas #security #technology
22 -
Divya Jain
📢 Exciting News! The Union Budget has allocated ₹2 crore for the establishment and salary expenses of the Data Protection Board. This significant step highlights the growing importance of data privacy and protection in India. The establishment of the Data Protection Board is crucial for enforcing data privacy regulations and ensuring compliance with the DPDP Act. This move will help safeguard our personal data and strengthen India's digital economy. Read more about it: (https://lnkd.in/gJ7f29sn) #DataPrivacy #UnionBudget2024 #DPDPAct #DataProtection #DigitalEconomy #India
9 -
Kanishk Gaur
What is #DigitalArrest ? Can someone be digital arrested in India for a crime ? Who are people behind #DigitalArrest ? How they get your details ? Watch my podcast with Doordarshan Kendra Prasar Bharati Here is the link https://lnkd.in/dA88hqMG #DigitalArrest #CyberSecurity #DigitalLaw #OnlineSafety #PublicPolicy #CyberCrime #TechTalk #DigitalRights #PrivacyProtection #AthenianTech #Doordarshan #PrasarBharati #KanishkGaur #CyberLaw #IndiaTech #DigitalIndia #Podcast #CyberAwareness #TechPolicy #InternetSafety
1063 Comments -
Obaidullah Kazmi
A bank is compromised --- Prioritizing identity security is a vital step in fortifying our defenses against ever-evolving cyber threats and protecting access to sensitive systems and data. Talk to CREDO’s Identity SMEs to discover how we can support your identity security journey. Mohammed Iliyas Anas Kamlani Syed Ibrahim Asad Razvi #identitysecurity #datasecurity #cybersecurity
35 -
CS Lokesh H. Vats
Strengthening Cyber Resilience and Payment Security: New RBI Directions for Non-Bank PSOs The Reserve Bank of India (RBI) has issued the “Master Directions on Cyber Resilience and Digital Payment Security Controls for non-bank Payment System Operators (PSOs)” to enhance the safety and security of payment systems in India. This comprehensive framework aims to address the evolving cyber security landscape and ensure robust governance and resilience among PSOs. Key highlights include: • Establishment of a robust governance mechanism for cyber risk management. • Implementation of baseline security measures to ensure system resiliency and secure digital payment transactions. • Introduction of a phased compliance approach for large, medium, and small non-bank PSOs, with deadlines ranging from April 2025 to April 2028. These directions emphasize the importance of continuous risk assessment, strong network security, data protection, and vendor risk management. By adhering to these guidelines, PSOs will be better equipped to mitigate cyber threats and enhance the overall security of the digital payment ecosystem. For more details, you can access the full Master Directions here: (https://lnkd.in/geEfsc3U) Associated Chartered #associatedchartered #RBI #digitalpayment #fema #banks
6 -
Shubhankar Rahul
The Indian government has introduced new standards, IS 19000:2022, to address fake reviews and enhance e-commerce credibility. These protocols require mandatory identification of reviewers and a written code of conduct for e-commerce companies. This initiative will be help & aligned in addressing the global issue of fake reviews, particularly in the hotel, travel, food, and beverage sectors. These steps aim to enhance the credibility and trustworthiness of online reviews in sectors vulnerable to fraudulent practices. Online platforms must also demonstrate compliance with these guidelines to ensure the authenticity of reviews and protect consumer trust. #India #DigialIndia #DigitalMarketing #ecommerce #Socialmedia # Appventurez
10 -
CA Hetal Shah
Amid reports of ‘cyber slavery’, telecom ministry to disconnect 2.17 crore mobile connections Analysis of data by the Indian Cyber Crime Coordination Centre (I4C), a division of MHA, had found an increase in the number of cyber crimes targeting Indians — about 45 per cent were found to originate from the Southeast Asia region. Around 1 lakh cyber complaints have been registered with the National Cyber Crime Reporting Portal since January 2023. The Union Ministry of Telecommunications has informed the Centre’s high-level inter-ministerial panel it will disconnect around 2.17 crore mobile connections, that are either taken on forged documents or misused in cybercrime, and also block 2.26 lakh mobile handsets. Earlier this month, the Department of Telecommunications (DoT) is learnt to have shared the data at a meeting held by the Union Ministry of Home Affairs (MHA) with the officials of Bureau of Immigration, Financial Intelligence Unit, Reserve Bank of India (RBI), Ministry of Electronics and Information Technology (Meity), National Investigation Agency (NIA), Central Bureau of Investigation (CBI), security experts of other agencies, and senior officials of all states and Union Territories. DoT said in the meeting that to identify roaming phone numbers in scam compounds in the Southeast Asia region, all the telecom service providers (TSPs) have been asked to provide data every week for Indian mobile numbers, which are under roaming facility in Hong Kong, Cambodia, Laos, Philippines, and Myanmar. “As per information received from the DoT, the total number of Indian SIM cards roaming in the Southeast Asia region is more than 6 lakh for the duration of April-June of this year. More than 1.4 lakh point of sale (PoS) agents are involved in selling these SIM cards across India. All the States/UTs police were requested to take appropriate legal action against these PoS agents allegedly involved with such sale of Indian SIMs, which is further used in scam compounds in Southeast Asia,” the source said. #mobileconnections #cybercrime #DoT https://lnkd.in/dfHAU5mu
-
Manish Mimani
Sharing my recent interaction with ETCISO on safeguarding Digital Identities and enhancing Mobile Payment Security! India, driving 46% of global digital transactions, processed 14.44 billion transactions worth ₹20.64 trillion via UPI in July 2024. The digital era has ushered in transformative opportunities, with Mobile Adoption at the forefront of how we live, work, and engage. Yet, this unparalleled progress comes with a pressing challenge: the pervasive rise of Digital Identity Fraud. We at Protectt.ai strongly believe that the foundation of a successful digital revolution lies in #resilience and #trust. It is imperative to harness the opportunities of digital transformation while embedding #security and #trust at its core. Check out the full article here: https://lnkd.in/dpUjZiYN
651 Comment -
Parvez Diwan
I am curious on how seriously corporate India will take DPDP. There is still a need to strengthen RBI and SEBI enforcement of the cybersecurity framework for institutions. I have found this is not yet done with any seriousness For DPDP, the new facet added is that the consumer also is not yet sensitized of privacy and the right to restrict. It is a long journey, but happy that the Indian government is taking the long overdue steps in the right direction. #dpdp #compliance. #cybersecurity.
311 Comment -
Muktesh Narula
The Telecom Regulatory Authority of India(TRAI) has taken a significant step towards addressing the persistent issue of #spam calls by introducing the Callling Number Authentication Service (CNAP). This move is poised to bring relief to millions of #mobile users who are inundated with unwanted and often #fraudulent #calls on a daily basis. By implementing #CNAP , TRAI aims to #authenticate and #verify the source of incoming calls, thereby reducing the volume of #spam calls reaching consumers. This initiative has the potential to greatly enhance user experience, increase trust in communication channels, and improve overall telecom services in India. Despite the positive intentions behind the #CNAP implementation, there are valid concerns that need to be addressed. One major issue revolves around #dataprivacy and the #security of #personalinformation . The process of authenticating calls involves sharing and processing #sensitive #data, raising questions about how this information will be handled and protected. Moreover, there is skepticism about the effectiveness of #CNAP in completely eradicating spam calls, as #spammers may find ways to bypass the authentication system or exploit loopholes in the regulations. Ensuring the robustness of the system and safeguarding user #privacy are critical challenges that must be carefully navigated. The introduction of #CNAP by TRAI represents a significant step towards combating #spam calls in India. While the initiative holds promise in reducing the nuisance of #unsolicited #communications, it is essential to address concerns related to #dataprivacy and the efficacy of the measures. Striking a balance between enhancing #user #experience ( #ux ) and safeguarding privacy is key to the successful implementation of #CNAP. By fostering transparency, accountability, and continuous evaluation of the system, TRAI can work towards creating a more secure and #spamfree #telecom environment for Indian consumers. #TRAI #CNAP #SpamCalls #DataPrivacy #customerexperience
17 -
Ajit Pillai, CAMS
Beware of Digital Arrest Scams in India Cybercrime in India is evolving, with fraudsters using tactics like "digital arrests" to prey on victims. These scams involve criminals posing as law enforcement, intimidating individuals into transferring funds by falsely implicating them in legal issues. As the ENFORCEMENT DIRECTORATE (ED) has highlighted, scammers have exploited social media platforms such as Facebook, Instagram, WhatsApp, and Telegram to lure people with fake stock investments, IPO allotments, and fabricated success stories. These "pig-butchering" scams, designed to drain victims' finances, have prompted the ED to file charges against eight individuals and issue advisories for public awareness. The Indian Cyber Crime Coordination Centre (I4C) has now issued a public advisory to protect citizens, reminding them that genuine officials won’t conduct arrests over video calls or through social media. Prime Minister Mr. Modi, addressing this on Mann Ki Baat, emphasized the importance of staying vigilant, advising people to "stop, think, and take action" when approached by anyone making such claims. With this rise in digital fraud, it’s crucial to report any suspicious activities immediately to the cybercrime helpline 1930 or via cybercrime.gov.in to combat these malicious tactics.
91 Comment -
Jaijit Bhattacharya
My views on NewsX podcast the recent phenomena of digital arrest and cyber security frauds in India. We need robust checks by holding banks culpable for allowing these fraudulent accounts that have been created despite KYC system in place NewsX https://lnkd.in/gU4Fyjy6
8 -
nasscom
The successful adoption of a digital policing solution in Rewari showcases #Techcredible India's impact on public safety. Through the collaboration between MeitY- nasscom Center of Excellence, Hartron, and Rezler Systems, the e-Beat system enhances police visibility and real-time data access while providing comprehensive crime trend analysis. This digital transformation, driven by AI software, allows for proactive policing and better supervision. It's a prime example of how innovation and collaboration are shaping a safer future. #Innovation #Tech #DigitalTransformation Debjani Ghosh Sanjeev Malhotra Sangeeta Gupta
231 Comment -
ObserveNow
Keynote address by Narendra Nath Gangavarapu, Joint Secretary, National Security Council Secretariat, Government of India at the 2nd Edition of the ObserveNow Digital Bharat Cybersecurity Summit & Awards 2024. #ObserveNowCybersecurity #ObservenowMedia #Cybersecurity #DigitalBharat #GenAI #policymakers #industryleaders #DataProtection #ObserveNowGovernance #AI #ArtificialIntelligence #Security #Summit #NewDelhi
131 Comment -
Pranab Mohanty
"Telecom giant Bharti Airtel has strongly denied allegations of a security breach following reports that a significant amount of customer data had been compromised. Rumours have circulated suggesting that details of 375 million (37.5 crore) Airtel customers, including their phone numbers, email addresses, residential addresses, and Aadhaar numbers, were allegedly available for sale on the dark web." I hope this is a Rumour only and the PII ( Personally Identifiable Information) data of 375 Million Individuals are safe and the Image of the Service Provider ( Data Fiduciary) is intact!! The good news is that very soon India will have the formal implementation of the DPDP Act, to ensure the protection of individual Personal Data ( PII). A quick compliant with DPDP act will prevent enterprises from Image Loss, Financial Loss and legal Hassels. The great news is that we Data Safeguard Inc. already have our "mak in India" comprehensive data privacy solution/product to assist enterprises in their DPDP Act compliance requirements. for more details please refer to the below PR link about the release of our India version Data Privacy Product ID-REDACT® #dpdpact #dataprivacy #datasafeguard https://lnkd.in/giKWRCiX https://lnkd.in/g6GAcWBf
14
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More