Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Blog

INCIDENTS OF BITCOIN & CRYPTOCURRENCY HACKING

Cyber Security & Privacy Blockchain
December 11, 2020 606 0

Throughout this era, we’ve determined quite 100 major hacks of crypto exchanges and alternative cryptocurrency-related services. Very often, the small print of the hack stays unclears. It’s straightforward to be told WHO was...


Blog

LWC: Securing IoT Data and Communication

Cyber Security & Privacy
December 8, 2020 107 0

Rapid advancement in highly constrained devices is making a great impact on our daily lives. From smartwatches to autonomous cars, everything is connected and becoming intelligent day by day. The Internet of Things is contributing...


Blog

Why do you need an IT Security Audit for your Business?

Cyber Security & Privacy
December 7, 2020 458 0

If you’re an organization looking to achieve its security and compliance goals, you will probably be in need of an IT security audit. However, why do you need a security audit?A detailed IT security audit provides you the opportun...


Blog

E2E: Key for the digital society and economy

Cyber Security & Privacy
December 4, 2020 127 0

Encryption is an important part of modern digital society. With the rapid transformation into the digital ecosystem, the threat to digital data increases day by day due to smart black hat hackers. Hence, strong encryption algorith...


Blog

Top 10 of 2020: Vulnerabilities and Attacking Techniques

Cyber Security & Privacy
November 26, 2020 1334 0

The risk and severity of cyber-attacks have clearly grown over the last 5-6 months. In the Covid19 situation, dependence on digital platforms, applications, and infrastructure underscores the need for efficient cybersecurity defen...


Blog

Work 2020-25: Remote, Dynamic & Modular

Cyber Security & Privacy
November 20, 2020 106 0

The year 2020 has changed our interaction with our workplace – some of the organizations have announced a long-term plan for working in a distributed environment. Everyone around us can relate 3 terms – Remote, Dynamic, and Modula...


Blog

Why SASE – Unified security juxtaposed with core networking capabilities

Cyber Security & Privacy
November 18, 2020 110 0

Secure Access Service Edge (SASE) is a relatively new term that was coined by Gartner in 2019, with the objective of providing low latency access to the employees, cloud services, and devices. Gartner, in its strategic paper, defi...


Blog

Nuts and Bolts of 5G Security: Technologies, Architectures, Use-cases, Standards & Policies

Cyber Security & Privacy
November 10, 2020 720 0

With recent 5G enabled flagship phone launches, everyone believes that we have moved one step closer to the wide adoption of this technology.  While the current 4G technology can handle voice, video stream, web browsing, and text ...


Blog

Security 2025: Future casting the impact of NCSS 2020

Cyber Security & Privacy
November 10, 2020 479 0

As India is on the way to becoming a USD 1 trillion digital economy, the Government of India is working towards updating its National Cyber Security Strategy 2020 (NCSS) in order to improve its position in cyberspace. While India ...


Blog

Vulnerability Assessment: Increasingly Becoming Top Priority for C-Suit in The New Normal

Cyber Security & Privacy
November 10, 2020 955 0

Conducting an assessment to look out for vulnerabilities existing within the networks, applications or infrastructure has always been an ideal approach to safeguard your organization against evolving and complex cyber threats. And...


© Copyright nasscom. All Rights Reserved.