Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Cybersecurity Threats To Look Out For In 2023

Cybersecurity Threats To Look Out For In 2023

IT Services Cyber Security & Privacy
September 29, 2023 62 0

Intro: Cybersecurity threats are evolving every moment. Stay informed about the emerging risks that can protect you or your organization in 2023. Here are some of the threats to look out for:   What is Automotive H...


Digital Twins in Industry 4.0: Bridging the Physical and Digital Worlds

Digital Twins in Industry 4.0: Bridging the Physical and Digital Worlds

Cyber Security & Privacy Digital Transformation 5G Industry 4.0
September 26, 2023 161 0

Digital Twins, a pioneering advancement in the era of Industry 4.0, are digital replicas of physical entities, systems, or processes. These virtual counterparts play a pivotal role in transforming industries by serving as a bridge...


Effective Roadmap to Plan and Implement Endpoint Protection

Effective Roadmap to Plan and Implement Endpoint Protection

Impact Stories Cyber Security & Privacy
September 23, 2023 64 0

Endpoint protection began in the late 1980s, marked by the advent of traditional antivirus (AV) software, which remains in use today as the primary defense against known malware variants. However, the landscape has evolved signifi...


nasscom Cloud Advocacy Program - Leaders Talk Ft. Aujas Cybersecurity

nasscom Cloud Advocacy Program - Leaders Talk Ft. Aujas Cybersecurity

Cloud Computing Cyber Security & Privacy
September 15, 2023 28 0

The nature and complexity of cyberattacks have been growing as technology permeates every aspect of our business & personal lives. AI and more recently Gen AI is adding more complexity to this. The pandemic forced many busines...


7 reasons to automate your DevSecOps

7 reasons to automate your DevSecOps

Cyber Security & Privacy Data Privacy Collaborations Emerging Tech AI Machine Learning DevOps
September 5, 2023 72 0

Automation - the heartbeat of modernization is employed across almost all lading sectors to enhance the speed and productivity of operations. Guided by flawless algorithms that seamlessly intertwine processes to execute actions wi...


Cyber Insurance Beyond the Basics

Cyber Insurance Beyond the Basics

Cyber Security & Privacy BFSI
August 30, 2023 146 1

Cyber Insurance Beyond the Basics In this age of big data and all-time high data usage, data breaches and related cybercrimes are becoming extremely common. In the recent past, data viola...


The Benefits of Artificial Intelligence in Cybersecurity

The Benefits of Artificial Intelligence in Cybersecurity

AI Cyber Security & Privacy
August 24, 2023 193 0

Currently, the number of users who are using devices and programs have increased  vastly in the ultramodern enterprise that generates a large quantum of data,  numerous of which are sensitive or nonpublic. Therefore, com...


Cybersecurity In Hospitality Industry: Why You Need To Protect Customer Data

Cybersecurity In Hospitality Industry: Why You Need To Protect Customer Data

IT Services Mobile & Web Development Cyber Security & Privacy
August 22, 2023 42 0

Why cybersecurity in hospitality is so critical? Do you know it costs more to recover from a cyberattack than to prevent one? Let’s look at examples where cyberattacks have cost millions worldwide.   FBI’s “2018 Inte...


The Power of Remote IT Service Delivery and Management

The Power of Remote IT Service Delivery and Management

Cyber Security & Privacy Threat Intelligence Future of work Application
August 21, 2023 35 0

In today's fast-paced digital world, the demand for efficient and reliable IT services has reached unprecedented levels. With the advent of advanced technologies and the widespread adoption of remote work, organizations are contin...


Creating Cybersecurity Budget and Best Practices

Creating Cybersecurity Budget and Best Practices

Project Management Cyber Security & Privacy
August 18, 2023 90 0

When finding cybersecurity vulnerabilities, we often focus on the clever tactics used by threat actors or the challenges faced by our team in maintaining good cyber hygiene. However, we may overlook a significant threat to securit...


© Copyright nasscom. All Rights Reserved.