Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Implementing DevSecOps in large enterprises

Implementing DevSecOps in large enterprises

Cloud Computing Cyber Security & Privacy Data Privacy Digital Transformation Data Privacy DevOps
February 26, 2024 34 0

In today's rapidly evolving digital landscape, ensuring the security of software systems is paramount for enterprises of all sizes. However, implementing effective security practices can be daunting for large organizations with co...


Preventing Advanced Persistent Threats

Preventing Advanced Persistent Threats

Cyber Security & Privacy
February 26, 2024 14 0

Cybersecurity is responsible for securing information through the implementation of particular policies to carry out technological infrastructure in both government and private organizations. However, security drawbacks and vulner...


Honey Trapping in Cybersecurity

Honey Trapping in Cybersecurity

Cyber Security & Privacy
February 23, 2024 12 0

In the field of cybersecurity, a "honey trap" is a technique that hackers use to entice victims into risky circumstances. Although honey traps can take many forms, they usually entail developing a false identity or online presence...


Unifying Security Endpoints Fuel Business Transformation

Unifying Security Endpoints Fuel Business Transformation

Cyber Forensics Data Privacy Executive Summary IT Services Cyber Security & Privacy
February 20, 2024 19 0

The digital world has become a sprawling metropolis of connected devices, cloud infrastructures, interdependent networks, and an ever-evolving threat landscape. Once confined to neat physical boundaries, businesses now navigate a ...


8 exciting GRC trends of 2023

8 exciting GRC trends of 2023

Cyber Security & Privacy
February 16, 2024 28 0

“Today’s challenge is not about finding needles in haystacks but snowflakes in snowstorms” said Mike Loginov, Chief Strategist at EMEA, HP at the GRC EU summit.  GRC (Governance, Risk, and Compliance) is one of the fu...


Mission-critical embedded systems: High reliability for improved security (Part-1)

Mission-critical embedded systems: High reliability for improved security (Part-1)

Cyber Security & Privacy
February 16, 2024 7 0

Security of embedded systems The word “security” immediately invokes related terms such as “confidentiality” and “privacy”, while conjuring up mental pictures of malicious hackers! It also brings to mind closely related securit...


Choosing the Right Data Security Service Provider for your Business

Choosing the Right Data Security Service Provider for your Business

Cyber Security & Privacy Data Privacy
February 14, 2024 15 0

With the increasing volume of sensitive data that businesses handle, data security has become an essential aspect of business operations. Data breaches can cause significant financial losses, damage to the company’s reputation, an...


DPDP Act 2023: Its Potential Implications for Businesses

DPDP Act 2023: Its Potential Implications for Businesses

Cyber Security & Privacy
February 8, 2024 11 0

We are inching to the end of 2023, and while a data protection law is finally in place, India has only just about started. The Digital India Act is expected to replace the Information Technology Act and Rules of 2000. Once enacted...


Top 9 DevSecOps Trends for 2024

Top 9 DevSecOps Trends for 2024

Cloud Computing Cyber Security & Privacy Industry Trends DevOps
January 15, 2024 37 0

As software continues to fuel the global economy, ensuring its security is not a choice but a necessity. A Gartner report predicts that by 2025, cyber attackers will have weaponized operational technology (OT) environmen...


Navigating the cybersecurity landscape in fintech: Best practices and emerging threats

Navigating the cybersecurity landscape in fintech: Best practices and emerging threats

Digital Transformation Fintech Data Privacy Cyber Security & Privacy
January 12, 2024 57 0

Navigating the cybersecurity landscape in fintech: Best practices and emerging threats In today’s rapidly evolving fintech landscape, the rise of digital platforms and data-driven approaches has created new and complex cybersec...


© Copyright nasscom. All Rights Reserved.