Topics In Demand
Notification
New

No notification found.

Filter
Cyber Forensics
Unifying Security Endpoints Fuel Business Transformation

Unifying Security Endpoints Fuel Business Transformation

Cyber Forensics Data Privacy Executive Summary IT Services Cyber Security & Privacy
February 20, 2024 3128 0

The digital world has become a sprawling metropolis of connected devices, cloud infrastructures, interdependent networks, and an ever-evolving threat landscape. Once confined to neat physical boundaries, businesses now navigate a ...


Creating an Effective and Agile Cyber Governance Structure

Creating an Effective and Agile Cyber Governance Structure

Cyber Forensics Cyber Security & Privacy
December 26, 2023 16 0

In the digital era, safeguarding critical infrastructure has become increasingly imperative due to the escalating threat of cyberattacks that can disrupt essential functions and undermine economic stability. These attacks exploit ...


Path to Cyber Maturity: Importance of Cybersecurity Governance

Path to Cyber Maturity: Importance of Cybersecurity Governance

Cyber Forensics Cyber Security & Privacy
July 31, 2023 47 0

When it comes to ensuring cyber safety and resilience across organizations, there is no one- size-fits-all solution. Achieving cybersecurity maturity requires careful planning, prioritization, and coordination throughout the busin...


LET’S GET DEEP INTO WEB 3.0 BASICS

LET’S GET DEEP INTO WEB 3.0 BASICS

Cyber Forensics Web 3.0
January 23, 2023 293 0

THE EVOLUTION OF THE WEB IN TODAY’S AGE The web has evolved much more over the years, and therefore its applications of it nowadays are nearly unidentifiable from its most period. The evolution of the web is often categori...


MOBILE FORENSICS TOOLS AND TECHNIQUES

MOBILE FORENSICS TOOLS AND TECHNIQUES

Cyber Forensics Cyber Security & Privacy
May 27, 2022 1951 1

Data acquisition is that the method of gathering information from mobile devices and their associated media. This method reduces the possibilities of information loss thanks to injury or battery depletion throughout storage and tr...


COMPUTER FORENSICS: CHAIN OF CUSTODY

COMPUTER FORENSICS: CHAIN OF CUSTODY

Cyber Forensics
May 12, 2022 5169 2

  What is the chain of custody in computer forensics? The chain of custody in digital forensics can also be referred to as the forensic link, the paper trail, or the chronological documentation of digital evidence. It i...


Cyber Advocacy - The Evolving Contours of a Critical Function

Cyber Advocacy - The Evolving Contours of a Critical Function

Cyber Forensics Data Privacy Cyber Security & Privacy
December 20, 2021 403 0

Introduction Cybersecurity is an inclusive concept; it not only has wide ramifications cutting across Societies, Government and Businesses, it also directly impacts human behavior - whether co-operative or malefic. The span, re...


Machine Learning  Implementation

Machine Learning Implementation

Cyber Forensics Big Data Analytics Cyber Security & Privacy
November 22, 2021 837 0

In an environment of mushrooming cyber threats and attacks, Security and Risk professionals are inundated with tasks pertaining to compliance, threat hunting, risk management and business/application security. With a scarcity of s...


SSL Forensics

SSL Forensics

Cyber Forensics
October 18, 2021 1049 0

SSL/TLS fingerprinting is a mechanism that was introduced way back in 2008 and has gained great significance now. In this mushrooming threat landscape, the usage of SSL/TLS has expanded quite rapidly. It has become almost the defa...


DATA BREACH

DATA BREACH

Data Privacy Cyber Forensics Cyber Security & Privacy
April 12, 2021 342 1

DATA BREACH A data breach exposes confidential, sensitive, or protected info to associate unauthorized person. The files in a every data breach are viewed/shared without permission. Anyone is often in danger of a data breach — ...


© Copyright nasscom. All Rights Reserved.