Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
The Role of Cybersecurity in Digital Transformation Initiatives

The Role of Cybersecurity in Digital Transformation Initiatives

Cyber Security & Privacy
July 9, 2024 13 0

In today's rapidly evolving digital landscape, organizations are increasingly embracing digital transformation to drive innovation, enhance operational efficiency, and deliver superior customer experiences. This transformation inv...


Ethical implications of AI in software development: A call for responsible innovation

Ethical implications of AI in software development: A call for responsible innovation

Cyber Security & Privacy AI Inside AI
July 8, 2024 11 0

As passionate advocates for innovation in software development, we've witnessed the transformative potential of Artificial Intelligence (AI) firsthand. AI has rapidly evolved from a theoretical concept to a practical tool capable ...


Ensuring Data Security in Transit: Best Practices and Protocols

Ensuring Data Security in Transit: Best Practices and Protocols

Data Privacy Cyber Security & Privacy
July 5, 2024 26 0

In today's interconnected world, data is constantly on the move. Whether it's sensitive financial information, personal data, or proprietary business details, the transmission of data over networks is integral to modern operations...


 Empowering Cybersecurity Resilience Through Innovation: A Case Study in Enhanced Incident Management

Empowering Cybersecurity Resilience Through Innovation: A Case Study in Enhanced Incident Management

Cyber Forensics Data Privacy Fintech Cyber Security & Privacy
June 29, 2024 101 1

  Empowering Cybersecurity Resilience Through Innovation: A Case Study in Enhanced Incident Management   What if your organization's most sensitive data could be compromised simply because your incident manag...


How Fraud Analytics can Level up Outcomes in Healthcare Monitoring Schemes

How Fraud Analytics can Level up Outcomes in Healthcare Monitoring Schemes

Cyber Security & Privacy Emerging Tech HealthTech and Life Sciences
June 25, 2024 14 0

Governments worldwide, regardless of size and boundaries, design and deliver healthcare schemes with the best intent and integrity. They also establish efficient monitoring systems to expand coverage and improve outcomes. However,...


The Role of Data Ethics in Digital Marketing: Balancing Personalization with Privacy

The Role of Data Ethics in Digital Marketing: Balancing Personalization with Privacy

Sales & Marketing Cyber Security & Privacy
June 22, 2024 5265 1

In the fast-paced world of digital marketing, data ethics have become a hot topic of discussion. as companies strive to personalize their marketing efforts to cater to individual preferences and behaviors, questions about privacy ...


Sovereign Cloud Solutions for a Secure Future

Sovereign Cloud Solutions for a Secure Future

Cyber Security & Privacy Cloud Computing
June 14, 2024 80 0

A sovereign cloud is a cloud computing environment designed to meet the specific data sovereignty requirements of an organization or government. This means data is stored in compliance with local laws and is protected from foreign...


Secrets management: The critical piece in your DevSecOps puzzle

Secrets management: The critical piece in your DevSecOps puzzle

Data Privacy Threat Intelligence Cyber Security & Privacy
June 10, 2024 22 0

Think of the secret ingredients that make your applications work – API keys, database passwords, certificates. These digital credentials unlock access to sensitive data and functionalities, but keeping them secure can be challengi...


The art of security in software development

The art of security in software development

Mobile & Web Development Cyber Security & Privacy
May 30, 2024 3 0

Imagine millions of users' credit card details and personal information exposed because of a security flaw. Unfortunately, this isn't a hypothetical scenario. In 2017, Equifax, a major credit bureau, suffered a data breach that im...


Exploring the Five Stages of a Successful CTEM Program

Exploring the Five Stages of a Successful CTEM Program

Threat Intelligence Cyber Security & Privacy
May 27, 2024 49 0

  The Continuous Threat Exposure Management or CTEM is a five-stage approach to continuously expose an organization's networks, systems, and assets to simulated attacks to identify vulnerabilities and weaknesses. This allo...


© Copyright nasscom. All Rights Reserved.