Header Banner Header Banner
Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Tackling the new reality of information and cyber security

Tackling the new reality of information and cyber security

Cyber Security & Privacy
March 23, 2023 294 0 Read Article

The new ISO/IEC 27001 standard is now in operation. The importance of updating and revising your Infosec posture cannot be over-emphasized. The reason is simple: the old standard was created to address the information and cyber se...


Leveraging Open Source Tools in Information Security Operations

Leveraging Open Source Tools in Information Security Operations

Cyber Security & Privacy
March 13, 2023 671 1 Read Article

  Information Security operations is a critical part of every organization operating in cyber space and refers to the ongoing processes and procedures for detecting, responding to, and mitigating cyber security incidents. ...


Cybersecurity in India: Trends, Threats, and Strategies for Protection

Cybersecurity in India: Trends, Threats, and Strategies for Protection

Cyber Security & Privacy
March 5, 2023 9509 1 Read Article

In today's digital world, cybersecurity is no longer a luxury - it's a necessity. India has quickly become one of the fastest-growing technology hubs in the world, but with that comes an increased risk of cyber threats. From finan...


The importance of securing critical infrastructure

The importance of securing critical infrastructure

Data Privacy Cyber Security & Privacy
March 2, 2023 552 0 Read Article

  With mission-critical data moving to the cloud, the threat landscape has increased, cementing the urgent need for all-round security About a decade ago, when cloud computing made inroads into the IT topology of organi...


Weaponized DSARs and the automation to follow

Weaponized DSARs and the automation to follow

Cyber Security & Privacy IT Services
March 2, 2023 185 0 Read Article

With the ever-increasing media coverage of high-profile data breaches and rising landmark fines, how data and information is handled and managed has never been more important. The growing use of Data Subject Access Requests (DSARs...


Is the food sector prepared for cyber attacks?

Is the food sector prepared for cyber attacks?

Digital Transformation Cyber Security & Privacy
March 2, 2023 302 0 Read Article

February 17, 2023 - As production and distribution become more automated within the food sector, the vulnerability of food manufacturers increases along with the odds of a cyberattack. With profit, efficiency, and productivit...


AI and Cybersecurity: Protecting Against the Unknown

AI and Cybersecurity: Protecting Against the Unknown

Data Science & AI Community Cyber Security & Privacy
February 24, 2023 379 0 Read Article

Introduction As technology continues to advance, so do the methods used by cybercriminals to penetrate networks and steal sensitive information. One of the most significant developments in recent years has been the use of artif...


Different Industrial Revolutions.

Different Industrial Revolutions.

Cyber Security & Privacy Industry 4.0
February 8, 2023 403 0 Read Article

Right now, we are going through the fourth industrial revolution or Industry 4.0. But, the era of technology might not have the same shape and size as of today but for their time, indeed, it was something for people to look at. Al...


Malicious Packages Are a Rising Threat in Software Supply Chain Attacks

Malicious Packages Are a Rising Threat in Software Supply Chain Attacks

DevOps NTLF NTLF 2023 Cyber Security & Privacy
February 7, 2023 373 0 Read Article

In this post, let's discuss what a software supply chain attack is and how it can negatively impact your business. We’ll define, deconstruct, and offer suggestions on how you can protect your business from one of the leading ...


First Principles of Application Security that define Success

First Principles of Application Security that define Success

Digital Transformation Cyber Security & Privacy
February 6, 2023 10019 2 Read Article

In continuous efforts by businesses to gain an edge over competition, they are incorporating features and enhancements as part of the value offerings and application development teams are playing a crucial role in helping achieve ...


© Copyright nasscom. All Rights Reserved.