Header Banner Header Banner
Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Are Suppliers Handling Your Data Responsibly?

Are Suppliers Handling Your Data Responsibly?

Cyber Security & Privacy IT Services
April 16, 2024 36 1 Read Article

Mitigating third-party vulnerability Decades ago, it was far simpler for an organization to identify the perimeter of its digital operations and put measures in place to prevent cyberattacks. The complexity and interconnecti...


Trust and Effective Management of Data and Privacy

Trust and Effective Management of Data and Privacy

Cyber Security & Privacy Data Privacy
April 16, 2024 41 1 Read Article

Our increasingly connected society presents a potential pathway to a smarter and more sustainable world, with improved services more readily available to all. An enabler to unlocking this potential for individuals, organizations, ...


Understanding XDR

Understanding XDR

IT Services Cyber Security & Privacy
April 11, 2024 115 0 Read Article

The security landscape is constantly evolving. As attackers develop new tactics, security professionals are trying to keep pace. Traditional security tools often struggle to provide a comprehensive view of threats, leaving enterpr...


AI: Reshaping the Tech Security Landscape

AI: Reshaping the Tech Security Landscape

Data Science & AI Community Cyber Security & Privacy
April 9, 2024 121 0 Read Article

  The tech security landscape is undergoing a dramatic transformation fuelled by Artificial Intelligence (AI). While AI offers incredible potential to protect data and systems, it also introduces new complexities. AI i...


Exploring 3 Key Trends Shaping the Evolution of Security Operations Centers

Exploring 3 Key Trends Shaping the Evolution of Security Operations Centers

Application Data Privacy Cyber Security & Privacy
April 8, 2024 94 0 Read Article

Author by: Amit Kharkade, Senior Technology Specialist - Xoriant The emergence of transformative technologies such as generative AI, the Internet of Things (IoT), and machine learning (ML) has revolutionized operational pa...


New Era of PHP Vulnerabilities: How Scanners Adapt to the Evolving Threat Landscape

New Era of PHP Vulnerabilities: How Scanners Adapt to the Evolving Threat Landscape

Cyber Security & Privacy
April 5, 2024 74 0 Read Article

The world of web application security is a constant arms race. Developers strive to build secure applications, while attackers continuously discover new vulnerabilities to exploit. In the realm of PHP, a widely used language for w...


Fortifying software supply chain security: Challenges & best practices

Fortifying software supply chain security: Challenges & best practices

Cloud Computing Data Privacy Threat Intelligence Data Privacy Cyber Security & Privacy
March 26, 2024 39 0 Read Article

The software supply chain, crucial in developing and distributing software, is increasingly targeted by cyber attackers. Vulnerabilities, malicious code injections, and compromised distribution channels pose significant risks, emp...


AI's Role in Cybersecurity Evolution

AI's Role in Cybersecurity Evolution

Cyber Security & Privacy
March 14, 2024 66 0 Read Article

Artificial Intelligence (AI) has emerged as a transformative force in the realm of cybersecurity, revolutionizing how organizations defend against an ever-evolving landscape of cyber threats. With the proliferation of sophisticate...


Everything You Need to Know About SD-WAN to Enhance All Your Network Routes

Everything You Need to Know About SD-WAN to Enhance All Your Network Routes

Cyber Security & Privacy Smart Mobility
March 14, 2024 2454 0 Read Article

Software-Defined Wide Area Networking (SD-WAN) has modernised conventional network architectures by bringing in a dynamic and adaptable approach to running wide-area networks. SD-WANs can strengthen network capability, improve per...


AI-Powered Strategies for Cyber Defense in GovTech

AI-Powered Strategies for Cyber Defense in GovTech

Cyber Security & Privacy
March 13, 2024 52 0 Read Article

In the ever-evolving landscape of technology, government agencies face increasingly sophisticated cyber threats. With sensitive data and critical infrastructure at stake, ensuring robust cybersecurity measures is paramount. Tradit...


© Copyright nasscom. All Rights Reserved.