Header Banner Header Banner
Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Quantum Computing

Quantum Computing

Data Privacy Cyber Security & Privacy
July 7, 2025 83 0 Read Article

What is Quantum Computing? Quantum computing is a revolutionary computing paradigm that leverages the principles of quantum mechanics—specifically superposition, entanglement, and quantum interference—to perform computations fa...


Customer Identity and Access Management Solutions to Build Better Customer Experiences and Trust

Customer Identity and Access Management Solutions to Build Better Customer Experiences and Trust

Cyber Security & Privacy
July 7, 2025 49 0 Read Article

Introduction Customers are the bread and butter of any business. Their point of view is critical today, with customer experience becoming more important than individual transactions. Digital platforms have made the customer mor...


Personalized Data Policy Creation & Workflow

Personalized Data Policy Creation & Workflow

Cyber Security & Privacy Data Privacy
July 2, 2025 53 0 Read Article

What is Personalized Data Policy Creation & Workflow? Personalized Data Policy Creation & Workflow refers to the ability to design, implement, and automate data governance policies that are tailored to specific datasets...


OT SOC for Utilities: Making Resilient Energy Infrastructures

OT SOC for Utilities: Making Resilient Energy Infrastructures

Cyber Security & Privacy Energy & Utilities
July 2, 2025 162 0 Read Article

As the energy sector is accelerating its digital transformation journey, Operational Technology (OT) networks, which were historically isolated, are now increasingly converging with IT systems. This convergence, on one side, bring...


Protected Health Information (PHI)

Protected Health Information (PHI)

Cyber Security & Privacy HealthTech and Life Sciences
July 1, 2025 72 0 Read Article

What is PHI? Protected Health Information (PHI) refers to any health-related data that can be linked to an individual and is governed by regulations such as the Health Insurance Portability and Accountability Act (HIPAA) in the...


?️ AI Adoption Is Racing Ahead — But Where’s the Risk Visibility?

?️ AI Adoption Is Racing Ahead — But Where’s the Risk Visibility?

AI Cyber Security & Privacy
June 26, 2025 72 1 Read Article

AI is the new arms race. From generative copilots and internal chatbots to full-blown LLM integrations, organizations are moving fast to operationalize AI. For many, the pressure to adopt is intense — competitive threats, innov...


Eyes, Fingers, and Faces: The Trifecta of Biometric Security in Software and Cloud

Eyes, Fingers, and Faces: The Trifecta of Biometric Security in Software and Cloud

Emerging Tech Cyber Security & Privacy
June 21, 2025 2088 0 Read Article

In today’s digital landscape, where nearly every interaction leaves an online trace, safeguarding our digital environments is more crucial than ever. As we navigate personal and professional realms, technology offers innovation wh...


Cybersecurity Risk Assessment: A Step-by-Step Guide

Cybersecurity Risk Assessment: A Step-by-Step Guide

Cyber Security & Privacy
June 21, 2025 50 0 Read Article

In an era where cyber threats evolve daily, protecting your digital assets isn’t optional — it's critical. According to IBM’s 2024 Cost of a Data Breach Report, the average breach now costs $4.45 million — a staggering reminder th...


Leading the way on Artificial Intelligence : How best performers approach and manage AI

Leading the way on Artificial Intelligence : How best performers approach and manage AI

Cyber Security & Privacy Data Science & AI Community
June 12, 2025 721 1 Read Article

The respondents in this survey work for companies at different stages of the artificial intelligence (AI) journey who primarily operate in the IT sector or develop AI systems. For the purpose of this report, the companies are divi...


How GCC Can Accelerate Tech Adoption and Enable Digital for Your Enterprise

How GCC Can Accelerate Tech Adoption and Enable Digital for Your Enterprise

Cyber Security & Privacy
June 11, 2025 167 0 Read Article

Maintaining a competitive edge in the aftermath of the pandemic has required enterprises to lean heavily on Managed GICs. Indian GIC service providers have rebounded from the slump induced by COVID-19 and returned to their growth ...


© Copyright nasscom. All Rights Reserved.