Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Combatting CSRF at Eventbrite: Safeguarding Strategy

Combatting CSRF at Eventbrite: Safeguarding Strategy

Cyber Security & Privacy
April 18, 2024 40 0

Background Cross-Site Request Forgery (CSRF), also known as “Sea Surf,” Session Riding, Hostile Linking, or one-click attacks, is a prevalent web security vulnerability that exploits users' trust in websites to execute unauthor...


Unraveling the Complexity of Cloud Security: What Should Enterprises Expect?

Unraveling the Complexity of Cloud Security: What Should Enterprises Expect?

Cyber Security & Privacy Cloud Computing
April 16, 2024 5 0

Author by: Amit Kharkade, Senior Technology Specialist - Xoriant Gartner projects that by 2025, an overwhelming 95% of new digital workloads are poised for cloud deployment. However, this shift doesn't imply a blind l...


Safeguarding Consumer IoT Data: Trust and Privacy

Safeguarding Consumer IoT Data: Trust and Privacy

Cyber Security & Privacy IOT
April 16, 2024 3 0

The expanding world of IoT devices and data security In the ever-expanding realm of technology and interconnected smart devices, the Internet of Things (IoT) is advancing at a rapid pace. According to Markets and Market...


Are Suppliers Handling Your Data Responsibly?

Are Suppliers Handling Your Data Responsibly?

Cyber Security & Privacy IT Services
April 16, 2024 4 0

Mitigating third-party vulnerability Decades ago, it was far simpler for an organization to identify the perimeter of its digital operations and put measures in place to prevent cyberattacks. The complexity and interconnecti...


Trust and Effective Management of Data and Privacy

Trust and Effective Management of Data and Privacy

Cyber Security & Privacy Data Privacy
April 16, 2024 2 0

Our increasingly connected society presents a potential pathway to a smarter and more sustainable world, with improved services more readily available to all. An enabler to unlocking this potential for individuals, organizations, ...


Understanding XDR

Understanding XDR

IT Services Cyber Security & Privacy
April 11, 2024 27 0

The security landscape is constantly evolving. As attackers develop new tactics, security professionals are trying to keep pace. Traditional security tools often struggle to provide a comprehensive view of threats, leaving enterpr...


AI: Reshaping the Tech Security Landscape

AI: Reshaping the Tech Security Landscape

Data Science & AI Community Cyber Security & Privacy
April 9, 2024 57 0

  The tech security landscape is undergoing a dramatic transformation fuelled by Artificial Intelligence (AI). While AI offers incredible potential to protect data and systems, it also introduces new complexities. AI i...


Exploring 3 Key Trends Shaping the Evolution of Security Operations Centers

Exploring 3 Key Trends Shaping the Evolution of Security Operations Centers

Application Data Privacy Cyber Security & Privacy
April 8, 2024 36 0

Author by: Amit Kharkade, Senior Technology Specialist - Xoriant The emergence of transformative technologies such as generative AI, the Internet of Things (IoT), and machine learning (ML) has revolutionized operational pa...


New Era of PHP Vulnerabilities: How Scanners Adapt to the Evolving Threat Landscape

New Era of PHP Vulnerabilities: How Scanners Adapt to the Evolving Threat Landscape

Cyber Security & Privacy
April 5, 2024 32 0

The world of web application security is a constant arms race. Developers strive to build secure applications, while attackers continuously discover new vulnerabilities to exploit. In the realm of PHP, a widely used language for w...


Fortifying software supply chain security: Challenges & best practices

Fortifying software supply chain security: Challenges & best practices

Cloud Computing Data Privacy Threat Intelligence Data Privacy Cyber Security & Privacy
March 26, 2024 7 0

The software supply chain, crucial in developing and distributing software, is increasingly targeted by cyber attackers. Vulnerabilities, malicious code injections, and compromised distribution channels pose significant risks, emp...


© Copyright nasscom. All Rights Reserved.