Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
ISO 27001:2022 Clause 4.2 – How Understanding Stakeholder Needs Strengthens Your ISMS

ISO 27001:2022 Clause 4.2 – How Understanding Stakeholder Needs Strengthens Your ISMS

Cyber Security & Privacy
March 23, 2025 7 0

In ISO 27001:2022, Clause 4.2 emphasizes a critical aspect of building a successful Information Security Management System (ISMS): understanding the needs and expectations of interested parties. 🔍 Who Are Interested Parties? ...


Can We Trust AI? The Growing Concerns Among Indians

Can We Trust AI? The Growing Concerns Among Indians

Cyber Security & Privacy Cloud Computing
March 20, 2025 32 0

Artificial Intelligence (AI) is no longer a futuristic concept; it is a reality deeply integrated into our daily lives. From voice assistants to predictive analytics, AI is transforming industries, enhancing efficiency, and stream...


Toward a Safer World With Digital Forensics

Toward a Safer World With Digital Forensics

Cyber Security & Privacy Emerging Tech Engineering Research & Design
March 6, 2025 42 0

With technology redefining every aspect of daily life, the scope of crime has evolved. Statistics indicate that 422 million individuals were impacted in 2022 alone, with costs running into trillions of dollars. To und...


Cybersecurity Risk vs Vulnerability vs Threat: What are the Differences?

Cybersecurity Risk vs Vulnerability vs Threat: What are the Differences?

Threat Intelligence Cyber Security & Privacy
March 6, 2025 12 0

In the intricate realm of cybersecurity, grasping the differences between risk, vulnerability, and threat is vital for solid protection. Each term signifies a distinct aspect of potential harm within the digital landscape, influen...


Strengthening Your Cybersecurity: Why it Matters More than Ever

Strengthening Your Cybersecurity: Why it Matters More than Ever

Data Privacy Cyber Security & Privacy
March 5, 2025 17 0

In today’s interconnected world, cybersecurity is no longer optional- it’s a necessity. As we increasingly rely on digital platforms for communication, commerce, and entertainment, the risks associated with cyber threats continue ...


Java Spring security with custom authentications

Java Spring security with custom authentications

Application Cyber Security & Privacy
March 4, 2025 10 0

Security in modern web applications is critical because these applications often handle sensitive data, including personal information, financial details, and intellectual property. Any breach can lead to significant harm for user...


Cloud Data Security Solutions Protecting Your Business from Cyber Threats

Cloud Data Security Solutions Protecting Your Business from Cyber Threats

Cyber Security & Privacy Cyber Forensics Digital Transformation Data Privacy Cloud Computing
February 28, 2025 140 0

The increase in Cyber Threats and attacks is estimated to be $10.5 trillion in 2025. Now, if we consider that back in 2015, a $3 trillion estimate, you can imagine just how great of a risk cyber threats pose to businesses across t...


[PART 2/2]: SECURING INDIA’S DIGITAL FUTURE: HOW CYBERSECURITY STARTUPS ARE SHAPING THE NEXT ERA

[PART 2/2]: SECURING INDIA’S DIGITAL FUTURE: HOW CYBERSECURITY STARTUPS ARE SHAPING THE NEXT ERA

Cyber Security & Privacy Emerging Tech Digital Transformation
February 27, 2025 281 0

In the first part of this series, we explored some of the pressing cybersecurity challenges that Indian DeepTech startups are trying to solve, spanning from securing critical infrastructure to ensuring data privacy and protecting ...


[Part 1/2]: Securing India’s Digital Future: How Cybersecurity Startups Are Shaping the Next Era

[Part 1/2]: Securing India’s Digital Future: How Cybersecurity Startups Are Shaping the Next Era

Cyber Security & Privacy Emerging Tech Digital Transformation
February 27, 2025 113 0

In a rapidly digitizing world, India stands at the cusp of a digital revolution, driven by supportive government initiatives and a surge in internet penetration. With over 900 million internet users1 and an expanding digital econo...


From Compliance to Competitive Edge: Why Data Sovereignty Is the New Business Imperative

From Compliance to Competitive Edge: Why Data Sovereignty Is the New Business Imperative

Cyber Security & Privacy Data Privacy
February 27, 2025 40 0

Data is no longer just an enterprise asset—it has evolved into a global currency, a geopolitical weapon, and the foundation of economic supremacy. In today’s AI-driven landscape, governments worldwide are redrawing the lines of di...


© Copyright nasscom. All Rights Reserved.