Topics In Demand
Notification
New

No notification found.

Filter
Data Privacy
The Benefits and Key Considerations of Outsourcing Cybersecurity Operations

The Benefits and Key Considerations of Outsourcing Cybersecurity Operations

Data Privacy Digital Transformation Cyber Security & Privacy
July 31, 2023 46 0

With the escalating complexity of cyber attacks and growing skill shortage, organizations are turning to outsourcing as a strategic solution. This trend is reflected in the rising utilization of Managed Security Service Provider...


What is the target of Indian exports?

What is the target of Indian exports?

Data Privacy IT Services
July 13, 2023 76 0

The export sector of India has seen many changes and is still seeing changes. The India export data shows that India’s export sector has moved towards high value goods. India has set a good target in order to improve the pe...


Avoiding digital chaos: Why a strong brand reputation is your armour

Avoiding digital chaos: Why a strong brand reputation is your armour

Analytics Data Privacy
June 22, 2023 102 0

During BSI’s Annual Connect Summit, I addressed the concept of digital trust amongst digital chaos and why putting privacy, data protection, and managing cybersecurity threats at the core of your organization’s strateg...


How EU regulations are shaping digital standards

How EU regulations are shaping digital standards

Digital Transformation Data Privacy
June 22, 2023 117 0

Happy birthday, GDPR! Not to burst the birthday balloon, but the EU’s landmark data protection and privacy regulation is a mere five years old (seven if you want to be pedantic) and like some youngsters, has made plenty of no...


What are the future prospects of biometric authentication and its impact on security?

What are the future prospects of biometric authentication and its impact on security?

Data Privacy Emerging Tech
May 27, 2023 177 0

What are the Future Prospects of Biometric Authentication and its Impact on Security? Biometric authentication, the use of unique biological characteristics to verify and identify individuals, has gained significant traction in...


Data trends that will redefine business landscape in 2023

Data trends that will redefine business landscape in 2023

Data Privacy Cloud Computing
May 18, 2023 200 0

In the age of the digital renaissance, data is looked at through the glass of indispensability. Data is the new capital organizations critically need to compete and grow. A Forrester report indicates that organizations shifting to...


DCSI CyberShikshaa Privacy Module

DCSI CyberShikshaa Privacy Module

Data Privacy
May 13, 2023 216 0

Get ready for a fresh start with CyberShikshaa Privacy Module for 'Women on Break' training program - new batch now enrolling! Women professionals who are on a career break due to medical or personal reasons and want to make a ...


Unlocking Success with Data Fabric: 5 Ways a Unified Data Management Platform Can Help You Achieve Your Goals

Unlocking Success with Data Fabric: 5 Ways a Unified Data Management Platform Can Help You Achieve Your Goals

Data Privacy
May 11, 2023 5 0

For centuries, the manufacturing sector has played a pivotal role in driving global economic growth. But now, with the emergence of Industry 4.0, this field is undergoing a significant overhaul – and data is at the heart of it all...


Navigating the Data Maze: Simplifying Divestitures and M&A Data Challenges with Unified Data Management

Navigating the Data Maze: Simplifying Divestitures and M&A Data Challenges with Unified Data Management

Data Privacy
May 9, 2023 13 0

Navigating the Data Maze: Simplifying Divestitures and M&A Data Challenges with Unified Data Management The year 2023 is poised to be a year of divestitures and mergers & acquisitions. However, this was not the case jus...


A guide to implement effective cloud vulnerability scanning

A guide to implement effective cloud vulnerability scanning

Cloud Computing Data Privacy Cyber Security & Privacy
May 8, 2023 11663 0

With the increasing use of cloud computing, securing our cloud systems from potential threats and vulnerabilities has become extremely critical. Data breaches are becoming increasingly common, and they occur because of software bu...


© Copyright nasscom. All Rights Reserved.