Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Cybersecurity in an Era of Digital Transformation

Cybersecurity in an Era of Digital Transformation

Cyber Security & Privacy
July 16, 2024 76 0

The digital era has brought about tremendous changes in our personal and professional lives, as well as our communication trends. Businesses and people are more connected than ever, owing to the widespread use of technology and th...


A Step-by-Step Guide: Implementing Data Governance in Healthcare – Part 1

A Step-by-Step Guide: Implementing Data Governance in Healthcare – Part 1

Cyber Security & Privacy Digital Transformation HealthTech and Life Sciences
July 10, 2024 33 0

In the rapidly evolving landscape of healthcare, effective data governance is crucial for ensuring patient privacy, maintaining data integrity, and optimizing healthcare delivery. However, transitioning from the concept of data go...


Ethical implications of AI in software development: A call for responsible innovation

Ethical implications of AI in software development: A call for responsible innovation

Cyber Security & Privacy AI Inside AI
July 8, 2024 10 0

As passionate advocates for innovation in software development, we've witnessed the transformative potential of Artificial Intelligence (AI) firsthand. AI has rapidly evolved from a theoretical concept to a practical tool capable ...


Ensuring Data Security in Transit: Best Practices and Protocols

Ensuring Data Security in Transit: Best Practices and Protocols

Data Privacy Cyber Security & Privacy
July 5, 2024 23 0

In today's interconnected world, data is constantly on the move. Whether it's sensitive financial information, personal data, or proprietary business details, the transmission of data over networks is integral to modern operations...


 Empowering Cybersecurity Resilience Through Innovation: A Case Study in Enhanced Incident Management

Empowering Cybersecurity Resilience Through Innovation: A Case Study in Enhanced Incident Management

Cyber Forensics Data Privacy Fintech Cyber Security & Privacy
June 29, 2024 98 1

  Empowering Cybersecurity Resilience Through Innovation: A Case Study in Enhanced Incident Management   What if your organization's most sensitive data could be compromised simply because your incident manag...


How Fraud Analytics can Level up Outcomes in Healthcare Monitoring Schemes

How Fraud Analytics can Level up Outcomes in Healthcare Monitoring Schemes

Cyber Security & Privacy Emerging Tech HealthTech and Life Sciences
June 25, 2024 12 0

Governments worldwide, regardless of size and boundaries, design and deliver healthcare schemes with the best intent and integrity. They also establish efficient monitoring systems to expand coverage and improve outcomes. However,...


The Role of Data Ethics in Digital Marketing: Balancing Personalization with Privacy

The Role of Data Ethics in Digital Marketing: Balancing Personalization with Privacy

Sales & Marketing Cyber Security & Privacy
June 22, 2024 5232 1

In the fast-paced world of digital marketing, data ethics have become a hot topic of discussion. as companies strive to personalize their marketing efforts to cater to individual preferences and behaviors, questions about privacy ...


Sovereign Cloud Solutions for a Secure Future

Sovereign Cloud Solutions for a Secure Future

Cyber Security & Privacy Cloud Computing
June 14, 2024 71 0

A sovereign cloud is a cloud computing environment designed to meet the specific data sovereignty requirements of an organization or government. This means data is stored in compliance with local laws and is protected from foreign...


Secrets management: The critical piece in your DevSecOps puzzle

Secrets management: The critical piece in your DevSecOps puzzle

Data Privacy Threat Intelligence Cyber Security & Privacy
June 10, 2024 18 0

Think of the secret ingredients that make your applications work – API keys, database passwords, certificates. These digital credentials unlock access to sensitive data and functionalities, but keeping them secure can be challengi...


Exploring the Five Stages of a Successful CTEM Program

Exploring the Five Stages of a Successful CTEM Program

Threat Intelligence Cyber Security & Privacy
May 27, 2024 47 0

  The Continuous Threat Exposure Management or CTEM is a five-stage approach to continuously expose an organization's networks, systems, and assets to simulated attacks to identify vulnerabilities and weaknesses. This allo...


© Copyright nasscom. All Rights Reserved.