Topics In Demand
Notification
New

No notification found.

Filter
Threat Intelligence
The Password Paradox: Choosing Unbreakable Passwords for You

The Password Paradox: Choosing Unbreakable Passwords for You

Threat Intelligence Data Privacy
May 7, 2024 10 0

Choosing the right password is crucial for online security. Using a robust password considerably decreases the chance of unauthorized access to your accounts. It acts as a barrier against cyberattacks and protects your sensitive i...


Fortifying software supply chain security: Challenges & best practices

Fortifying software supply chain security: Challenges & best practices

Cloud Computing Data Privacy Threat Intelligence Data Privacy Cyber Security & Privacy
March 26, 2024 14 0

The software supply chain, crucial in developing and distributing software, is increasingly targeted by cyber attackers. Vulnerabilities, malicious code injections, and compromised distribution channels pose significant risks, emp...


Cyber Grinch alert: Secure yourself this holiday season

Cyber Grinch alert: Secure yourself this holiday season

Digital Payment Safety Threat Intelligence Cyber Security & Privacy
December 12, 2023 41 0

'Tis the season for festive joy and, unfortunately, a heightened risk of holiday cyber-attacks. As Christmas approaches, we all look forward to a well-deserved break from our computers, creating an open season for hackers. Surpris...


Navigating the Moral Crossroads: Ethical Challenges in AI Decision-Making

Navigating the Moral Crossroads: Ethical Challenges in AI Decision-Making

Threat Intelligence AI
December 8, 2023 38 0

With AI and Algorithms in every aspect, the decisions made by machines are becoming increasingly intertwined with our daily lives. As we head towards technological advancements, it's crucial to shine a light on the ethical challen...


Addressing Ransomware in Critical Information Infrastructure: Ten Essential Questions and Actions

Addressing Ransomware in Critical Information Infrastructure: Ten Essential Questions and Actions

Analytics Cyber Security & Privacy Threat Intelligence
October 13, 2023 51 0

Critical information infrastructure is facing an escalating and multifaceted threat from ransomware attacks. These attacks, once predominantly associated with data breaches and financial extortion, have evolved into a tool for dis...


The Power of Remote IT Service Delivery and Management

The Power of Remote IT Service Delivery and Management

Cyber Security & Privacy Threat Intelligence Future of work Application
August 21, 2023 58 0

In today's fast-paced digital world, the demand for efficient and reliable IT services has reached unprecedented levels. With the advent of advanced technologies and the widespread adoption of remote work, organizations are contin...


Educating and empowering developers to build the DevSecOps culture

Educating and empowering developers to build the DevSecOps culture

Cyber Security & Privacy Data Privacy Threat Intelligence Data Privacy DevOps
August 18, 2023 40 0

In our increasingly interconnected world, where data breaches and security threats dominate headlines, it is time for organizations to step up their security game to ensure threats and breaches are kept at bay. To tackle these cha...


Beyond reactive measures: Harnessing threat modelling for DevSecOps success

Beyond reactive measures: Harnessing threat modelling for DevSecOps success

Cloud Computing Cyber Security & Privacy Threat Intelligence DevOps
July 21, 2023 9318 0

In the world of software development, DevOps aims to make the process faster and deliver better-quality software to users. DevSecOps takes it a step further by focusing on security, quality, and speed. While tools and tests are in...


Threat Intelligence and Research initiative : Threat Advisory by DSCI

Threat Intelligence and Research initiative : Threat Advisory by DSCI

Threat Intelligence
February 14, 2023 352 0

In the latest threat advisory 'Threat Intelligence and Research initiative' by DSCI, read about the recent threats like Upsilon Ransomware, Zendaya Ransomware, Seiv Ransomware, G-Stars Ransomware, the attacker encrypts a victim's ...


Rise & Fall of Protractor - What are the Top Alternatives to Protractor?

Rise & Fall of Protractor - What are the Top Alternatives to Protractor?

Threat Intelligence Application
June 22, 2022 1375 0

The Protractor testing tool is an end to end behavior-driven testing framework designed keeping Angular JS applications in mind. Hang one a minute, does that mean Protractor won’t work with non-angular JS applications? The answer ...


© Copyright nasscom. All Rights Reserved.