Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Feed Your SOC with Advanced Threat Intelligence

Feed Your SOC with Advanced Threat Intelligence

Cyber Security & Privacy
March 17, 2021 114 0

Why SOC Needs Threat Intelligence? Growing security threats and the rising volume of related data are making the job of a Security Operations Center (SOC) cumbersome. In a survey conducted by Ponemon Institute in 2019, 53% of r...


Three focus areas to avoid supply chain cybersecurity attacks

Three focus areas to avoid supply chain cybersecurity attacks

Cyber Security & Privacy
March 15, 2021 17 0

Supply chain cybersecurity attacks have been in the news lately, but they’re nothing new. Nation-state adversaries have been targeting and abusing supply chain vulnerabilities for years. These vulnerabilities are an easy “in,” ...


6 Things To Look For in a Penetration Testing Services Provider in India

6 Things To Look For in a Penetration Testing Services Provider in India

Cyber Security & Privacy
March 12, 2021 2550 0

In the wake of soaring cyber attacks, penetration testing services have acquired remarkable prominence worldwide. Business owners, stakeholders, IT risk managers, CIOs and developers, who have recognized the importance of having a...


Blog

Top 7 reasons why it is important to backup your files in today’s age of cyberthreats

Cyber Security & Privacy
March 10, 2021 400 0

2017 was the year of biggest hacks, persistent and endless stream of breaches and leaks, that affected innumerable businesses and people across the globe.Cybercriminals stole the personal data of over 148 million people by penetra...


Edge AI: Changing the Cyber Security Landscape through Scalable and Flexible Data Safety

Edge AI: Changing the Cyber Security Landscape through Scalable and Flexible Data Safety

NTLF NTLF Forum 2021 Cyber Security & Privacy
March 9, 2021 805 0

Edge AI: Changing the Cyber Security Landscape through Scalable and Flexible Data Safety The year 2020 was a watershed moment for technology adoption. The COVID-19 pandemic forced businesses around the world to transition to re...


Blog

What should CIOs look for in a VDI solution?

Cyber Security & Privacy
March 9, 2021 42 0

In these times of unprecedented disruption requiring realignment of short- & mid-term strategies, businesses face the challenge to achieve more with same or minimal resources. With the remote working becoming the new normal, b...


Blog

What's in store for cybersecurity startup product market?

Cyber Security & Privacy
March 4, 2021 96 0

According to Data Security Council of India (DSCI)’s latest report, the number of Indian cybersecurity product startups in 2020 has grown to over 225 from over 175 in 2018, while the revenue doubled to over $1 billion in 2020 from...


Blog

Kubernetes Security: Key Factors to Consider

Cyber Security & Privacy
February 27, 2021 404 0

Containers and Kubernetes adoption have been phenomenal in the last year. According to the recently published CNCF report, container adoption has jumped to 84%, with Kubernetes being adopted by 78% of respondents to orchestrate th...


Blog

How to secure your mobile device data in 2021?

Cyber Security & Privacy
February 25, 2021 574 0

Imagine waking up in the morning and finding your smartphone’s battery exceptionally low (although you fully charged it the last night). The notification bar is cluttered with multiple notifications and messages that you didn’t ev...


Blog

THINGS CISOs NEED TO CONSIDER WHILE EMBRACING DECEPTION TECHNOLOGY

Cyber Security & Privacy
February 25, 2021 370 1

Deception is not a new concept for organizations and security professionals. It is being implemented since the late 1990s in the form of “Honeypots”, aiming to deceive threat actors. However, things have now changed to a great ext...


© Copyright nasscom. All Rights Reserved.