Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
How to choose the right vulnerability scanner for your security needs

How to choose the right vulnerability scanner for your security needs

Threat Intelligence Digital Transformation AI Machine Learning IT Services Cyber Security & Privacy
September 9, 2024 17 0

Organizations find safeguarding their infrastructure and applications complex as the digital landscape becomes increasingly complicated. Unaddressed vulnerabilities can lead to devastating consequences, including data breaches, op...


What are the Security Best Practices for Software Development?

What are the Security Best Practices for Software Development?

Cyber Security & Privacy
September 3, 2024 41 0

In this modern technological era, we depend on software for almost everything. However, this dependence has associated risks in the form of cyberattacks. They are too common and dangerous, making it essential to incorporate securi...


SEBI's Cybersecurity Framework: A Boon for the Indian Tech Industry

SEBI's Cybersecurity Framework: A Boon for the Indian Tech Industry

Cyber Forensics Cyber Security & Privacy
August 29, 2024 137 0

  SEBI-regulated entities will soon need to implement a framework to improve cyber security and cyber resilience, announced the market regulator in June 2024. The entities will need to adopt it based on their grading, whic...


Enhancing Cybersecurity in Fintech: Safeguarding Consumer Data

Enhancing Cybersecurity in Fintech: Safeguarding Consumer Data

Cyber Forensics Cyber Security & Privacy
August 26, 2024 49 0

In this era of digitalization, Fintech has dramatically changed how we handle money.  At the same time, despite its convenience and accessibility, this digital innovation also poses many serious dangers, particularly about...


Cybersecurity Mesh: A Modern Approach to Network Security

Cybersecurity Mesh: A Modern Approach to Network Security

Application Cyber Security & Privacy
August 23, 2024 47 0

Cybersecurity Mesh is a distributed security architecture that connects various security tools and technologies to create a cohesive defense. It's designed to address the challenges of traditional network security approaches, whic...


Fortify Your DevOps: Mastering Vulnerability Management

Fortify Your DevOps: Mastering Vulnerability Management

Cyber Security & Privacy Cyber Forensics Data Privacy Digital Payment Safety Threat Intelligence DevOps
August 16, 2024 43 0

The widespread impact of the CrowdStrike outage has forced businesses to reevaluate their cybersecurity strategies. Luckily, the incident didn't breach any systems, but it revealed the fragility of even the most sophisticated secu...


THE HIDDEN COST OF DLP INCIDENTS- Financial Fallout, Operational Challenges, and the Way Forward

THE HIDDEN COST OF DLP INCIDENTS- Financial Fallout, Operational Challenges, and the Way Forward

Data Privacy Data Science & AI Community Emerging Tech IT Services Cyber Security & Privacy
August 12, 2024 79 0

  THE HIDDEN COST OF DLP INCIDENTS Financial Fallout, Operational Challenges, and the Way Forward Data Loss Prevention (DLP) is a critical aspect of modern cybersecurity, designed to detect and prevent potential data...


Essential Cybersecurity Precautions for Your Business

Essential Cybersecurity Precautions for Your Business

Member’s Speak Cyber Security & Privacy
August 5, 2024 70 1

In today’s digital age, cybersecurity is a critical concern for businesses of all sizes. Having attended a recent cybersecurity event hosted by NASSCOM, I’m eager to share some insights and practical precautions that companies sho...


A Practical Guide to Building Security-First Architectures

A Practical Guide to Building Security-First Architectures

Data Privacy IT Services Cyber Security & Privacy
July 24, 2024 1612 0

Authored by: Amit Kharkade, Senior Technology Specialist - Xoriant The shift to multi-cloud environments and hybrid work models has introduced significant security challenges for Chief Information Security Officers (C...


A Step-by-Step Guide: Implementing Data Governance in Healthcare – Part 2

A Step-by-Step Guide: Implementing Data Governance in Healthcare – Part 2

Cyber Security & Privacy Digital Transformation HealthTech and Life Sciences
July 22, 2024 48 0

Building on the foundational elements of people and technology discussed in the first part of our guide, where we discussed some practical steps for data governance in the healthcare sector, we now turn our attention to the e...


© Copyright nasscom. All Rights Reserved.