Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Current best practices for proactive cyber hygiene and threat monitoring

Current best practices for proactive cyber hygiene and threat monitoring

Cyber Security & Privacy
May 15, 2025 61 0

Countries worldwide are increasingly relying on digital infrastructure. India is also the world’s largest digital democracy, with its internet landscape projected to reach over 900 million users by 2025. Unfortunately, the growing...


Tech Talks | Reimagining Security : An Era Powered by Generative AI [Part 1]

Tech Talks | Reimagining Security : An Era Powered by Generative AI [Part 1]

Cyber Security & Privacy nasscom insights
May 15, 2025 6 0

In the Video Haripriya Kanduri - Vice President, Head of Cybersecurity, CIS, India , Capgemini Pooja Bhattacharjee - Project Manager, System Plus Solutions Vishal Gupta - Program Manager, AI & Cybersecurity, Bosch Sneha...


The ROI of Intelligent Access Management (IAM)

The ROI of Intelligent Access Management (IAM)

Cyber Security & Privacy
May 13, 2025 8 0

Imagine a growing organization struggling to manage who gets access to what systems. Manual approval processes strain employees, the IT team is stretched thin, and a missed compliance step leaves the company vulnerable to fines or...


Enhancing API Security with AI/ML: A Critical Imperative

Enhancing API Security with AI/ML: A Critical Imperative

Digital Transformation Cyber Security & Privacy
May 13, 2025 76 0

Imagine this: A major retailer suffers a massive data breach. Customer credit card information, social security numbers, and purchase histories – all exposed. The culprit? It is not a sophisticated phishing attack but a vul...


Enhancing Cybersecurity in BFSI with IT Staff Augmentation

Enhancing Cybersecurity in BFSI with IT Staff Augmentation

Cyber Security & Privacy
May 8, 2025 23 0

The cybersecurity landscape constantly revolutionizes, posing new and complex challenges for organizations. Building a solid cybersecurity framework is necessary with growing cyberattacks and regulatory requirements. Cybersecurity...


5 Reasons Why Employee Cybersecurity Awareness Training Is Important

5 Reasons Why Employee Cybersecurity Awareness Training Is Important

Cyber Security & Privacy
April 30, 2025 51 0

Cybersecurity threats have evolved dramatically, and so must the way organizations respond. No longer confined to the IT department, cyber risk now permeates every aspect of business operations. Even with cutting-edge technologies...


Cyber Readiness: The Non-Negotiable Imperative for India’s Digital Growth

Cyber Readiness: The Non-Negotiable Imperative for India’s Digital Growth

Data Privacy Cyber Security & Privacy
April 30, 2025 23 0

  According to cyber intelligence company CloudSEK, India has now become the second-most targeted country for cyberattacks in the world, with a data theft breach affecting 95 Indian entities in 2024 alone. This statisti...


AI-Powered Cybersecurity: Can Machines Outthink Hackers?

AI-Powered Cybersecurity: Can Machines Outthink Hackers?

Cyber Security & Privacy Current Issues
April 25, 2025 33 0

What if the next breakthrough in cybersecurity doesn’t come from a human at all? Could a machine detect, adapt, and neutralize cyber threats faster than any expert ever could? Or are we handing too much control to algorithms in a ...


Top 7 National Cybersecurity Strategies

Top 7 National Cybersecurity Strategies

Cyber Security & Privacy
April 23, 2025 81 0

As a Senior Security Engineer, I've seen directly how critical robust national cybersecurity strategies are in protecting a nation's critical infrastructures and ensuring the safety of its citizens' digital lives. In this digi...


Endpoint Security: The First Line of Defense against Modern Cyber Threats

Endpoint Security: The First Line of Defense against Modern Cyber Threats

Cyber Security & Privacy
April 23, 2025 19 0

In today’s hyperconnected world, where employees access sensitive data from multiple devices and locations, endpoint security has become more critical than ever. With cyber threats evolving rapidly, endpoints such as laptops, mobi...


© Copyright nasscom. All Rights Reserved.