Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
 Cloud Computing Security Issues

 Cloud Computing Security Issues

Cyber Security & Privacy Cloud Computing
October 22, 2024 105 0

  The popularity of cloud computing has skyrocketed in recent years, thanks to major players like Amazon, Google, and Microsoft offering comprehensive cloud platforms. While cloud computing has revolutionized how organizat...


AI vs AI: The Role of Generative AI in Strengthening Digital Defense and Fueling Cyber Attacks

AI vs AI: The Role of Generative AI in Strengthening Digital Defense and Fueling Cyber Attacks

In the Spotlight Cyber Security & Privacy
October 21, 2024 302 1

Cybersecurity is now a battleground not just for humans, but for AI systems, with Generative AI (GenAI) playing a dual role in both strengthening defenses and enabling new types of cyberattacks. On one hand, GenAI is revolutionizi...


Software Defined Vehicles (SDV) — Shift in Vehicle Cybersecurity

Software Defined Vehicles (SDV) — Shift in Vehicle Cybersecurity

Cyber Security & Privacy
October 17, 2024 83 0

The automotive OEMs are constantly pushing the boundaries to pair safety and sustainability with customer convenience in the run-up to realising the dream of connected, autonomous, shared mobility and electric vehicles (CASE). The...


The Transformative Impact of AI on Cybersecurity Practices

The Transformative Impact of AI on Cybersecurity Practices

Cyber Security & Privacy
October 17, 2024 21 0

In the world of digital business today, keeping your data safe via cybersecurity is a non-negotiable for companies of any scale. With cyber threats evolving unprecedentedly, enterprises constantly seek innovative solutions to prot...


The five DevSecOps anti-patterns you must avoid

The five DevSecOps anti-patterns you must avoid

Cloud Computing Cyber Security & Privacy Data Privacy Data Privacy DevOps
October 16, 2024 100 0

You might be wondering why we need to talk about anti-patterns when we could discuss the patterns. Think of it this way: Anti-patterns are like the "-5" of the process. If non-DevSecOps practices are a "0," we're not even at neutr...


Guardians of Access: Navigating Identity and Access Management to Secure Your Digital Landscape

Guardians of Access: Navigating Identity and Access Management to Secure Your Digital Landscape

Data Privacy Cyber Security & Privacy
October 15, 2024 50 0

Authored by: Shekhar Joshi, VP of Technology and CISO - Xoriant As we recognize Cybersecurity Awareness Month, it’s an opportune time to talk about a critical component of security: Identity and Access Management (IAM). In...


Zero Trust Architecture: Why It's More Important Than Ever

Zero Trust Architecture: Why It's More Important Than Ever

Cyber Security & Privacy
October 8, 2024 96 0

Over the years, the rise of cloud computing, remote work, and IoT devices has expanded the attack surface of enterprises, leading to increased digital risks and cyber threats. Traditional perimeter-based security models, where tru...


Evolution of modern chassis architecture for SDVs

Evolution of modern chassis architecture for SDVs

Cyber Security & Privacy
October 7, 2024 15 0

The automotive world continues to evolve around the four major pillars of ACES (Autonomous, Connected, Electrified, and Shared). At the heart of this revolution are Software Defined Vehicles (SDVs), which are reshaping traditional...


Harnessing AI for a Smarter, Proactive Approach to Cybersecurity Incident Management

Harnessing AI for a Smarter, Proactive Approach to Cybersecurity Incident Management

Cyber Security & Privacy Threat Intelligence Data Science & AI Community Digital Transformation Emerging Tech IT Services AI
September 30, 2024 176 0

  In today's rapidly evolving digital landscape, cybersecurity incidents have become more sophisticated. Organizations across industries are witnessing increasingly complex and diverse cyberattacks, insider threats, and da...


Enhancing Security in Generative AI Applications: Key Risks and How to Manage Them

Enhancing Security in Generative AI Applications: Key Risks and How to Manage Them

AI Cyber Security & Privacy
September 24, 2024 58 0

  Authored by: Suresh Bansal, Technical Manager - Xoriant Security is critical for any application, especially as generative AI moves from academic research to real-world enterprise use. Large Language Models (LLMs) hav...


© Copyright nasscom. All Rights Reserved.