Header Banner Header Banner
Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Software Defined Vehicles (SDV) — Shift in Vehicle Cybersecurity

Software Defined Vehicles (SDV) — Shift in Vehicle Cybersecurity

Cyber Security & Privacy
October 17, 2024 169 0 Read Article

The automotive OEMs are constantly pushing the boundaries to pair safety and sustainability with customer convenience in the run-up to realising the dream of connected, autonomous, shared mobility and electric vehicles (CASE). The...


The Transformative Impact of AI on Cybersecurity Practices

The Transformative Impact of AI on Cybersecurity Practices

Cyber Security & Privacy
October 17, 2024 150 0 Read Article

In the world of digital business today, keeping your data safe via cybersecurity is a non-negotiable for companies of any scale. With cyber threats evolving unprecedentedly, enterprises constantly seek innovative solutions to prot...


The five DevSecOps anti-patterns you must avoid

The five DevSecOps anti-patterns you must avoid

Cloud Computing Cyber Security & Privacy Data Privacy Data Privacy DevOps
October 16, 2024 137 0 Read Article

You might be wondering why we need to talk about anti-patterns when we could discuss the patterns. Think of it this way: Anti-patterns are like the "-5" of the process. If non-DevSecOps practices are a "0," we're not even at neutr...


Guardians of Access: Navigating Identity and Access Management to Secure Your Digital Landscape

Guardians of Access: Navigating Identity and Access Management to Secure Your Digital Landscape

Data Privacy Cyber Security & Privacy
October 15, 2024 95 0 Read Article

Authored by: Shekhar Joshi, VP of Technology and CISO - Xoriant As we recognize Cybersecurity Awareness Month, it’s an opportune time to talk about a critical component of security: Identity and Access Management (IAM). In...


Zero Trust Architecture: Why It's More Important Than Ever

Zero Trust Architecture: Why It's More Important Than Ever

Cyber Security & Privacy
October 8, 2024 159 0 Read Article

Over the years, the rise of cloud computing, remote work, and IoT devices has expanded the attack surface of enterprises, leading to increased digital risks and cyber threats. Traditional perimeter-based security models, where tru...


Evolution of modern chassis architecture for SDVs

Evolution of modern chassis architecture for SDVs

Cyber Security & Privacy
October 7, 2024 31 0 Read Article

The automotive world continues to evolve around the four major pillars of ACES (Autonomous, Connected, Electrified, and Shared). At the heart of this revolution are Software Defined Vehicles (SDVs), which are reshaping traditional...


Harnessing AI for a Smarter, Proactive Approach to Cybersecurity Incident Management

Harnessing AI for a Smarter, Proactive Approach to Cybersecurity Incident Management

Cyber Security & Privacy Threat Intelligence Data Science & AI Community Digital Transformation Emerging Tech IT Services AI
September 30, 2024 262 0 Read Article

  In today's rapidly evolving digital landscape, cybersecurity incidents have become more sophisticated. Organizations across industries are witnessing increasingly complex and diverse cyberattacks, insider threats, and da...


Enhancing Security in Generative AI Applications: Key Risks and How to Manage Them

Enhancing Security in Generative AI Applications: Key Risks and How to Manage Them

AI Cyber Security & Privacy
September 24, 2024 66 0 Read Article

  Authored by: Suresh Bansal, Technical Manager - Xoriant Security is critical for any application, especially as generative AI moves from academic research to real-world enterprise use. Large Language Models (LLMs) hav...


Combatting Climate Change: How Cloud Computing is Driving Sustainability Initiatives

Combatting Climate Change: How Cloud Computing is Driving Sustainability Initiatives

Cyber Security & Privacy Cloud Computing
September 20, 2024 39 0 Read Article

  Climate change can be now considered one of the critical global issues of the present century that requires prompt and complex solutions. Covers all the aspects starting from greenhouse gas emission reduction and energy ...


AI-driven vulnerability scanning: A new era of cybersecurity

AI-driven vulnerability scanning: A new era of cybersecurity

Cyber Forensics Data Privacy Threat Intelligence AI Machine Learning Cyber Security & Privacy
September 17, 2024 143 0 Read Article

In a world where cyber threats are evolving rapidly, the practice of vulnerability scanning is undergoing a transformative revolution. Static defences and reactive measures are no longer efficient to discover threats. Today cybers...


© Copyright nasscom. All Rights Reserved.