Header Banner Header Banner
Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
How Fraud Analytics can Level up Outcomes in Healthcare Monitoring Schemes

How Fraud Analytics can Level up Outcomes in Healthcare Monitoring Schemes

Cyber Security & Privacy Emerging Tech HealthTech and Life Sciences
June 25, 2024 42 0 Read Article

Governments worldwide, regardless of size and boundaries, design and deliver healthcare schemes with the best intent and integrity. They also establish efficient monitoring systems to expand coverage and improve outcomes. However,...


The Role of Data Ethics in Digital Marketing: Balancing Personalization with Privacy

The Role of Data Ethics in Digital Marketing: Balancing Personalization with Privacy

Sales & Marketing Cyber Security & Privacy
June 22, 2024 5401 1 Read Article

In the fast-paced world of digital marketing, data ethics have become a hot topic of discussion. as companies strive to personalize their marketing efforts to cater to individual preferences and behaviors, questions about privacy ...


Sovereign Cloud Solutions for a Secure Future

Sovereign Cloud Solutions for a Secure Future

Cyber Security & Privacy Cloud Computing
June 14, 2024 126 0 Read Article

A sovereign cloud is a cloud computing environment designed to meet the specific data sovereignty requirements of an organization or government. This means data is stored in compliance with local laws and is protected from foreign...


Exploring the Five Stages of a Successful CTEM Program

Exploring the Five Stages of a Successful CTEM Program

Threat Intelligence Cyber Security & Privacy
May 27, 2024 70 0 Read Article

  The Continuous Threat Exposure Management or CTEM is a five-stage approach to continuously expose an organization's networks, systems, and assets to simulated attacks to identify vulnerabilities and weaknesses. This allo...


Growing Market Of VAPT Services In India: Key Contributing Factors

Growing Market Of VAPT Services In India: Key Contributing Factors

IT Services Cyber Security & Privacy
May 22, 2024 278 0 Read Article

The digital landscape of India is experiencing exponential growth, and with this expansion comes a heightened focus on cybersecurity. Vulnerability Assessment and Penetration Testing (VAPT) services are rapidly becoming an essenti...


PowerShell: Simplifying Task Automation and Cybersecurity on Windows

PowerShell: Simplifying Task Automation and Cybersecurity on Windows

Cyber Forensics Cyber Security & Privacy
May 22, 2024 97 0 Read Article

  PowerShell is a powerful tool that helps automate tasks and manage configurations, especially on Windows systems. It's also useful for penetration testers and ethical hackers to automate various activities. In simple ...


8 Benefits Of Shifting To Cloud Security Providers

8 Benefits Of Shifting To Cloud Security Providers

Cyber Security & Privacy Cloud Computing
May 21, 2024 31 0 Read Article

As cloud adoption continues to accelerate, organizations are struggling with the complexities of securing their cloud environments effectively. Traditional security measures tailored for on-premises infrastructures often fall shor...


Secure Coding Techniques: Building Robust and Resilient Software

Secure Coding Techniques: Building Robust and Resilient Software

Cyber Security & Privacy
May 17, 2024 43 0 Read Article

Article Contents: Input Validation Parameterized Queries Authentication and Authorization Session Management Error Handling Secure Configuration Regular Updates and Patch Management Here’s a brief overview o...


Mission-critical embedded systems: High reliability for improved security (Part-2)

Mission-critical embedded systems: High reliability for improved security (Part-2)

Cyber Security & Privacy
May 14, 2024 28 0 Read Article

  As we saw in part-1 of this article, high availability of mission critical systems translates to improved security and redundant boot mechanisms ensures high availability of embedded systems. Redundant boot m...


AISecOps: The future of security operations is intelligent

AISecOps: The future of security operations is intelligent

Cyber Security & Privacy Data Privacy Data Privacy DevOps AI
May 14, 2024 118 0 Read Article

The digital landscape is constantly evolving, and so are the threats we face. Traditional security operations, reliant on manual analysis and limited resources, need help to keep up with the ever-growing volume and sophistication ...


© Copyright nasscom. All Rights Reserved.