Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Building a Comprehensive Security Framework: Leveraging AI for Enhanced Data Protection

Building a Comprehensive Security Framework: Leveraging AI for Enhanced Data Protection

Cyber Security & Privacy Data Privacy Data Science & AI Community AI
October 30, 2024 15 0

By Deepam Kanjani, Principal Security Engineer, Snowflake   Introduction: Expanding the Scope of Security in Modern Data Platforms In today's fast-paced digital world, modern organizations face a growing number of secu...


Vulnerability scanning for maintaining compliance and regulations

Vulnerability scanning for maintaining compliance and regulations

Data Privacy Data Privacy Cyber Security & Privacy
October 29, 2024 105 0

Vulnerability scanning's ultimate goal is to safeguard sensitive data. It is a critical component of any security strategy, enabling you to proactively identify and mitigate security vulnerabilities before they are exploited. The ...


Cybersecurity Challenges in IoT: Ensuring Data Safety in a Connected World

Cybersecurity Challenges in IoT: Ensuring Data Safety in a Connected World

Cyber Security & Privacy IOT
October 25, 2024 8 0

  In today's hyperconnected world, the Internet of Things is reshaping our lives. IoT devices are connected to everything that we perform daily, whether they are in the form of smart homes or industrial applications, and h...


Drones, Data, and Cloud: How Real-Time Analytics Shape Battlefield Strategies

Drones, Data, and Cloud: How Real-Time Analytics Shape Battlefield Strategies

Cyber Security & Privacy Cloud Computing
October 25, 2024 29 0

  Correctly said, one may say that information is the most potent weapon in today’s war. For some forces, managing and processing the live data makes all the difference between victory and the lack thereof. Hence, today's ...


Enhancing Security in Generative AI Applications: Proactive Measures for Safer Apps

Enhancing Security in Generative AI Applications: Proactive Measures for Safer Apps

Data Privacy Cyber Security & Privacy
October 22, 2024 51 0

Authored by: Suresh Bansal, Technical Manager - Xoriant As LLM applications grow in popularity, ensuring their security is critical. In Part 1 of this blog series, we discussed the various risks these applications face. Now, in...


 Cloud Computing Security Issues

 Cloud Computing Security Issues

Cyber Security & Privacy Cloud Computing
October 22, 2024 63 0

  The popularity of cloud computing has skyrocketed in recent years, thanks to major players like Amazon, Google, and Microsoft offering comprehensive cloud platforms. While cloud computing has revolutionized how organizat...


AI vs AI: The Role of Generative AI in Strengthening Digital Defense and Fueling Cyber Attacks

AI vs AI: The Role of Generative AI in Strengthening Digital Defense and Fueling Cyber Attacks

In the Spotlight Cyber Security & Privacy
October 21, 2024 165 0

Cybersecurity is now a battleground not just for humans, but for AI systems, with Generative AI (GenAI) playing a dual role in both strengthening defenses and enabling new types of cyberattacks. On one hand, GenAI is revolutionizi...


Software Defined Vehicles (SDV) — Shift in Vehicle Cybersecurity

Software Defined Vehicles (SDV) — Shift in Vehicle Cybersecurity

Cyber Security & Privacy
October 17, 2024 42 0

The automotive OEMs are constantly pushing the boundaries to pair safety and sustainability with customer convenience in the run-up to realising the dream of connected, autonomous, shared mobility and electric vehicles (CASE). The...


The Transformative Impact of AI on Cybersecurity Practices

The Transformative Impact of AI on Cybersecurity Practices

Cyber Security & Privacy
October 17, 2024 10 0

In the world of digital business today, keeping your data safe via cybersecurity is a non-negotiable for companies of any scale. With cyber threats evolving unprecedentedly, enterprises constantly seek innovative solutions to prot...


The five DevSecOps anti-patterns you must avoid

The five DevSecOps anti-patterns you must avoid

Cloud Computing Cyber Security & Privacy Data Privacy Data Privacy DevOps
October 16, 2024 34 0

You might be wondering why we need to talk about anti-patterns when we could discuss the patterns. Think of it this way: Anti-patterns are like the "-5" of the process. If non-DevSecOps practices are a "0," we're not even at neutr...


© Copyright nasscom. All Rights Reserved.