Topics In Demand
Notification
New

No notification found.

Filter
Threat Intelligence
Fortifying software supply chain security: Challenges & best practices

Fortifying software supply chain security: Challenges & best practices

Cloud Computing Data Privacy Threat Intelligence Data Privacy Cyber Security & Privacy
March 26, 2024 7 0

The software supply chain, crucial in developing and distributing software, is increasingly targeted by cyber attackers. Vulnerabilities, malicious code injections, and compromised distribution channels pose significant risks, emp...


Cyber Grinch alert: Secure yourself this holiday season

Cyber Grinch alert: Secure yourself this holiday season

Digital Payment Safety Threat Intelligence Cyber Security & Privacy
December 12, 2023 9 0

'Tis the season for festive joy and, unfortunately, a heightened risk of holiday cyber-attacks. As Christmas approaches, we all look forward to a well-deserved break from our computers, creating an open season for hackers. Surpris...


Navigating the Moral Crossroads: Ethical Challenges in AI Decision-Making

Navigating the Moral Crossroads: Ethical Challenges in AI Decision-Making

Threat Intelligence AI
December 8, 2023 27 0

With AI and Algorithms in every aspect, the decisions made by machines are becoming increasingly intertwined with our daily lives. As we head towards technological advancements, it's crucial to shine a light on the ethical challen...


Addressing Ransomware in Critical Information Infrastructure: Ten Essential Questions and Actions

Addressing Ransomware in Critical Information Infrastructure: Ten Essential Questions and Actions

Analytics Cyber Security & Privacy Threat Intelligence
October 13, 2023 34 0

Critical information infrastructure is facing an escalating and multifaceted threat from ransomware attacks. These attacks, once predominantly associated with data breaches and financial extortion, have evolved into a tool for dis...


The Power of Remote IT Service Delivery and Management

The Power of Remote IT Service Delivery and Management

Cyber Security & Privacy Threat Intelligence Future of work Application
August 21, 2023 35 0

In today's fast-paced digital world, the demand for efficient and reliable IT services has reached unprecedented levels. With the advent of advanced technologies and the widespread adoption of remote work, organizations are contin...


Educating and empowering developers to build the DevSecOps culture

Educating and empowering developers to build the DevSecOps culture

Cyber Security & Privacy Data Privacy Threat Intelligence Data Privacy DevOps
August 18, 2023 32 0

In our increasingly interconnected world, where data breaches and security threats dominate headlines, it is time for organizations to step up their security game to ensure threats and breaches are kept at bay. To tackle these cha...


Beyond reactive measures: Harnessing threat modelling for DevSecOps success

Beyond reactive measures: Harnessing threat modelling for DevSecOps success

Cloud Computing Cyber Security & Privacy Threat Intelligence DevOps
July 21, 2023 9311 0

In the world of software development, DevOps aims to make the process faster and deliver better-quality software to users. DevSecOps takes it a step further by focusing on security, quality, and speed. While tools and tests are in...


Threat Intelligence and Research initiative : Threat Advisory by DSCI

Threat Intelligence and Research initiative : Threat Advisory by DSCI

Threat Intelligence
February 14, 2023 348 0

In the latest threat advisory 'Threat Intelligence and Research initiative' by DSCI, read about the recent threats like Upsilon Ransomware, Zendaya Ransomware, Seiv Ransomware, G-Stars Ransomware, the attacker encrypts a victim's ...


Rise & Fall of Protractor - What are the Top Alternatives to Protractor?

Rise & Fall of Protractor - What are the Top Alternatives to Protractor?

Threat Intelligence Application
June 22, 2022 1295 0

The Protractor testing tool is an end to end behavior-driven testing framework designed keeping Angular JS applications in mind. Hang one a minute, does that mean Protractor won’t work with non-angular JS applications? The answer ...


MSSPs adopting SD-WAN security approaches

MSSPs adopting SD-WAN security approaches

Threat Intelligence Cyber Security & Privacy
September 6, 2021 67 0

  SD-WAN Market: SD-WAN has become one of the most extensively adopted technologies of the last few decades. The adoption of SD-WAN increased from 35% to 54% between 2017 and 2019, according to IDG Research Services' 20...


© Copyright nasscom. All Rights Reserved.