Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
How to enable secure & seamless remote access to graphics-intense applications?

How to enable secure & seamless remote access to graphics-intense applications?

Cyber Security & Privacy Function
October 7, 2021 115 0

The demand for graphics visualization is growing exponentially primarily driven by the growth in data generation and consumption, coupled with the ever-increasing expectations on quality of visuals. Graphics-intense applications a...


A Comprehensive Look at How CIAM Can Enhance the Customer Security and Experience

A Comprehensive Look at How CIAM Can Enhance the Customer Security and Experience

Data Privacy Cyber Security & Privacy
October 6, 2021 58 0

A Comprehensive Look at How CIAM Can Enhance the Customer Security and Experience Did you know that you can now implement a smarter, safer, and more engaging customer experience for your end-users with CIAM? Here’s how. De...


Blockchain Is Not Just For Cryptocurrencies! Here’s How Enterprises Can Leverage Blockchain To Improve Efficiency

Blockchain Is Not Just For Cryptocurrencies! Here’s How Enterprises Can Leverage Blockchain To Improve Efficiency

Current Issues Cyber Security & Privacy Digital Payment Safety Smart Mobility Blockchain COVID-19
September 21, 2021 2905 0

The term blockchain might be quite new for most of us. But if you have been following NASSCOM blogs you might have come across blockchain a few times. Though blockchain might be something we have not heard, there is absolutely no ...


NETFLOW VS DPI: Know the difference

NETFLOW VS DPI: Know the difference

Cyber Security & Privacy
September 20, 2021 1681 0

NetFlow was developed for network performance monitoring and visibility. However, in the current circumstances, NetFlow fails to offer enough visibility or context that is provided by Deep Packet Inspection. DPI --- or full packet...


Why principle of least privilege is a must in perimeter-less workspace

Why principle of least privilege is a must in perimeter-less workspace

Cyber Security & Privacy
September 20, 2021 100 0

Gone are the days when employees would gather on office premises, use office-provided laptops or desktops and work only within the realm of a defined network. Working from wherever one is, using whatever device one has, over whate...


Cyber-powered Global Capability Centres (GCC) - moving from ‘now’ to ‘next’

Cyber-powered Global Capability Centres (GCC) - moving from ‘now’ to ‘next’

Global Capability Centers GCC Cyber Security & Privacy
September 15, 2021 1679 0

  GCC 3.0 and the rising value proposition to both the parent organisation and India According to a recent NASSCOM-Deloitte report, GCCs in India garnered a revenue of USD 33.8 Bn in 2019-2020 - about 1% of India’s GDP,...


How Human-Centric Design is Reshaping Cybersecurity

How Human-Centric Design is Reshaping Cybersecurity

Cyber Security & Privacy
September 15, 2021 2776 0

We live in a world where Data and Information are the most precious thing for any organization. It allows us to determine the cause of the problem, enhances efficiency, and improves our decision-making skills significantly. Thu...


12 cybersecurity measures to instantly protect your business data

12 cybersecurity measures to instantly protect your business data

Cyber Security & Privacy
September 9, 2021 78 0

Rapid digitalization has made today’s cybersecurity landscape highly complex and challenging. Ginni Rometty, IBM’s chairman, president, and CEO, said: “Cybercrime is the greatest threat to every company in the world.” S...


MSSPs adopting SD-WAN security approaches

MSSPs adopting SD-WAN security approaches

Threat Intelligence Cyber Security & Privacy
September 6, 2021 74 0

  SD-WAN Market: SD-WAN has become one of the most extensively adopted technologies of the last few decades. The adoption of SD-WAN increased from 35% to 54% between 2017 and 2019, according to IDG Research Services' 20...


Cybersecurity and Privacy

Cybersecurity and Privacy

Cyber Security & Privacy
September 2, 2021 312 0

The ability to protect our sensitive information emanates from the term privacy, and security is the element of protection. Privacy cannot exist without security. While privacy in a broader sense deals specifically with the regula...


© Copyright nasscom. All Rights Reserved.