Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Transforming Cyber-Responses with Threat Analytics Centers

Transforming Cyber-Responses with Threat Analytics Centers

Cyber Security & Privacy
January 31, 2025 26 0

In an increasingly complex and continuously evolving cyber threat landscape, organizations worldwide are facing a growing number of potential security challenges. Cyber Threat Analytics has become key for proactive defenses, enabl...


5 Best Cybersecurity Certifications To Upskill Your Career in 2025

5 Best Cybersecurity Certifications To Upskill Your Career in 2025

Cyber Security & Privacy
January 28, 2025 224 0

Cybersecurity protects computers, data, and networks from theft, loss, damage, or unauthorized access. As interconnectedness is on the rise, so are the opportunities for hackers to steal, damage, or disrupt. Rise in cybercrime has...


Top 10 Cybersecurity Objectives for Companies

Top 10 Cybersecurity Objectives for Companies

Cyber Security & Privacy
January 23, 2025 52 1

As a Sr. Security Engineer, I know how critical cybersecurity is for businesses of all sizes. In today’s fast-paced digital world, cyber threats are evolving every day, making it more important than ever for companies to estab...


Tech Bytes - Jan 2025 | Tech Trends, Future of Work, Cybersecurity, AI, Future Skills

Tech Bytes - Jan 2025 | Tech Trends, Future of Work, Cybersecurity, AI, Future Skills

Cyber Security & Privacy AI Future of work nasscom insights
January 23, 2025 518 0

In the Video Namita Jain Research Practice Lead, Nasscom Insights Neha Jain Senior Analyst, Nasscom Insights Sneha Sharma Analyst, Nasscom Insights Prajwal Pandey Senior Analyst, Nasscom Insights Khyati Kap...


Implementation of Custom Kiosk Mode on Windows 10 IoT Enterprise 

Implementation of Custom Kiosk Mode on Windows 10 IoT Enterprise 

Cyber Security & Privacy Digital Transformation Emerging Tech
January 20, 2025 116 0

Windows 10 Internet of Things (IoT) is widely used in embedded devices across various domains, including point-of-sale terminals, medical devices, banking, and automotive systems. One of the important features of Windows 10 is “Ki...


Cybersecurity in IT: Essential Best Practices for Safeguarding Your Systems

Cybersecurity in IT: Essential Best Practices for Safeguarding Your Systems

Cyber Security & Privacy
January 20, 2025 19 0

How safe is your IT setup? New technologies present new cyber threats, and cyberspace includes vulnerabilities and opportunities for cash. Cyber security has become a vital part of the industry that protects sensitive data from br...


Top 7 Important Types of Computer Security

Top 7 Important Types of Computer Security

Cyber Security & Privacy
January 15, 2025 14 0

As a Sr. Cybersecurity Specialist, I understand how important  it is to protect computers and networks from various threats. In today's digital world, safeguarding sensitive data and systems has become more important than eve...


2025- When Tech Ignites Minds and Thoughts have Price Tags

2025- When Tech Ignites Minds and Thoughts have Price Tags

Cyber Security & Privacy
January 10, 2025 108 1

Picture yourself in a world where your thoughts could be hacked, your AI assistant negotiates your next vacation package, and quantum computers solve climate puzzles in a jiffy. We are in 2025 - where science fiction dissolves int...


AI Agents and Cybersecurity: Are Autonomous Systems Vulnerable to Exploitation?

AI Agents and Cybersecurity: Are Autonomous Systems Vulnerable to Exploitation?

Data Science & AI Community Cyber Security & Privacy
January 7, 2025 258 0

The integration of artificial intelligence (AI) agents into various industries has ushered in a new era of efficiency, innovation, and capability. These systems, designed to operate autonomously, are now pivotal in domains ranging...


The Importance of Secure, Verified Identity in a Digital World

The Importance of Secure, Verified Identity in a Digital World

Cyber Security & Privacy AI Blockchain
January 7, 2025 134 0

    Our identity is not confined to physical documents like passports or driver's licenses. Instead, it exists as a complex web of digital attributes, credentials, and personal data, scattered across multiple platf...


© Copyright nasscom. All Rights Reserved.