Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
NextGen IAM – Your Catalyst For Digital Transformation

NextGen IAM – Your Catalyst For Digital Transformation

Digital Transformation Emerging Tech Cyber Security & Privacy
April 8, 2022 218 0

New entrants in the market are taking a digital first strategy by embodying digital processes upfront. Quite a few of the new kids on the block have adopted a completely radical approach to solving an existing problem by going dig...


Forget passwords to improve security #biometrics #MFA #SSO

Forget passwords to improve security #biometrics #MFA #SSO

Cyber Security & Privacy
March 21, 2022 233 0

Digital transformation has gained unprecedented momentum in the past couple of years with businesses striving to remain on the edge, to deal with evolving challenges and gain a competitive advantage.  This has resulted in ...


Powering digital experiences across the ITeS sector in an era of tech intensity

Powering digital experiences across the ITeS sector in an era of tech intensity

Cyber Security & Privacy Digital Transformation Cloud Computing
March 11, 2022 5365 1

  Powering digital experiences across the ITeS sector in an era of tech intensity With tech intensity becoming a strong driver to build a culture of innovation, ITeS companies are transforming themselves as disruption d...


Why ‘identity-first’ is the new mantra to ensure security across hybrid workspace?

Why ‘identity-first’ is the new mantra to ensure security across hybrid workspace?

Cyber Security & Privacy
March 9, 2022 250 0

Credential theft has witnessed a meteoric rise in the past couple of years with the surge in remote work. Reports suggest over 4/5th of data breaches resulting from hacking involve the use, or misuse, of l...


BE CYBERSAFE - FIGHT RANSOMWARE

BE CYBERSAFE - FIGHT RANSOMWARE

Cyber Security & Privacy
February 22, 2022 459 0

SYSTEM BASED ATTACK-RANSOMWARE Ransomware is a sort of attack that has grown in importance as a danger to both businesses and individuals in the last two years. The majority of contemporary ransomware variations encrypt files o...


BE CYBERSAFE - FIGHT DNS SPOOFING

BE CYBERSAFE - FIGHT DNS SPOOFING

Digital Transformation Cyber Security & Privacy
February 13, 2022 240 0

SYSTEM BASED ATTACK- DNS SPOOFING What is domain name system (DNS) spoofing Domain Name Server (DNS) spoofing (a.k.a. DNS cache poisoning) is an attack in which altered DNS records are used to redirect online traffic to a fr...


BE CYBERSAFE - FIGHT PHISHING

BE CYBERSAFE - FIGHT PHISHING

Cyber Security & Privacy
February 3, 2022 322 1

WEB BASED ATTACK- PHISHING What is phishing attack?   Phishing is a type of social engineering assault that is frequently used to obtain sensitive information from users, such as login credentials and credit card det...


What is Operational Technology (OT) Cybersecurity?

What is Operational Technology (OT) Cybersecurity?

Cyber Security & Privacy
January 28, 2022 557 0

Operational technology (OT) cybersecurity includes the processes that involve the discovery, monitoring, and remediation of network-connected OT devices affected by unusual behavior. OT can be defined as the network-connected d...


Cybersecurity in 2022: Have You Prepared Your Security Checklist?

Cybersecurity in 2022: Have You Prepared Your Security Checklist?

Cyber Security & Privacy
January 28, 2022 3467 0

  2022 is all set to be another eventful and somewhat terrifying year, for the entire world, from the growth and security point of view. The new variant of COVID-19 is showing no signs of slowing down, raising complication...


Cyber Security – an Attacker view post-pandemic

Cyber Security – an Attacker view post-pandemic

Cyber Security & Privacy
January 7, 2022 363 0

We have entered an era of digital disruption, where commerce and industries are moving from traditional ways of working towards adopting more agile and flexible frameworks to stay competitive and relevant. This rapid adoption of...


© Copyright nasscom. All Rights Reserved.