Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Growing Market Of VAPT Services In India: Key Contributing Factors

Growing Market Of VAPT Services In India: Key Contributing Factors

IT Services Cyber Security & Privacy
May 22, 2024 156 0

The digital landscape of India is experiencing exponential growth, and with this expansion comes a heightened focus on cybersecurity. Vulnerability Assessment and Penetration Testing (VAPT) services are rapidly becoming an essenti...


PowerShell: Simplifying Task Automation and Cybersecurity on Windows

PowerShell: Simplifying Task Automation and Cybersecurity on Windows

Cyber Forensics Cyber Security & Privacy
May 22, 2024 55 0

  PowerShell is a powerful tool that helps automate tasks and manage configurations, especially on Windows systems. It's also useful for penetration testers and ethical hackers to automate various activities. In simple ...


8 Benefits Of Shifting To Cloud Security Providers

8 Benefits Of Shifting To Cloud Security Providers

Cyber Security & Privacy Cloud Computing
May 21, 2024 15 0

As cloud adoption continues to accelerate, organizations are struggling with the complexities of securing their cloud environments effectively. Traditional security measures tailored for on-premises infrastructures often fall shor...


Secure Coding Techniques: Building Robust and Resilient Software

Secure Coding Techniques: Building Robust and Resilient Software

Cyber Security & Privacy
May 17, 2024 17 0

Article Contents: Input Validation Parameterized Queries Authentication and Authorization Session Management Error Handling Secure Configuration Regular Updates and Patch Management Here’s a brief overview o...


Mission-critical embedded systems: High reliability for improved security (Part-2)

Mission-critical embedded systems: High reliability for improved security (Part-2)

Cyber Security & Privacy
May 14, 2024 15 0

  As we saw in part-1 of this article, high availability of mission critical systems translates to improved security and redundant boot mechanisms ensures high availability of embedded systems. Redundant boot m...


AISecOps: The future of security operations is intelligent

AISecOps: The future of security operations is intelligent

Cyber Security & Privacy Data Privacy Data Privacy DevOps AI
May 14, 2024 36 0

The digital landscape is constantly evolving, and so are the threats we face. Traditional security operations, reliant on manual analysis and limited resources, need help to keep up with the ever-growing volume and sophistication ...


IoT Penetration Testing: Securing Connected Devices

IoT Penetration Testing: Securing Connected Devices

Cyber Forensics IOT Cyber Security & Privacy
May 10, 2024 47 0

The Internet of Things (IoT) has transformed our lives by interconnecting an ever-growing number of devices that communicate and exchange data via the internet. These devices range from everyday household items like smart thermost...


Zero Trust Security: A Cornerstone Of Modern Cybersecurity

Zero Trust Security: A Cornerstone Of Modern Cybersecurity

Data Privacy Digital Transformation Cyber Security & Privacy
May 7, 2024 49 0

Author by: Amit Kharkade, Senior Technology Specialist - Xoriant In today's digital era, where AI is prevalent and businesses are rapidly embracing digital transformations, ensuring robust security measures is paramou...


The Rising Threat of Deepfakes in Cyber Security and Privacy

The Rising Threat of Deepfakes in Cyber Security and Privacy

Data Privacy Cyber Security & Privacy
May 3, 2024 673 0

Introduction In the digital age, the line between reality and artificiality is becoming increasingly blurred. One of the most significant contributors to this phenomenon is the advent of deepfakes. These AI-generated synthetic ...


Strengthening Web Security: A Multi-Layered Approach to CSRF Protection

Strengthening Web Security: A Multi-Layered Approach to CSRF Protection

Cyber Security & Privacy
May 2, 2024 8 0

Background Cross-Site Request Forgery (CSRF), also known as “Sea Surf,” Session Riding, Hostile Linking, or one-click attacks, is a prevalent web security vulnerability that exploits users' trust in websites to execute unauthor...


© Copyright nasscom. All Rights Reserved.