Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Leading the way on Artificial Intelligence : How best performers approach and manage AI

Leading the way on Artificial Intelligence : How best performers approach and manage AI

Cyber Security & Privacy Data Science & AI Community
June 12, 2025 16 0

The respondents in this survey work for companies at different stages of the artificial intelligence (AI) journey who primarily operate in the IT sector or develop AI systems. For the purpose of this report, the companies are divi...


How GCC Can Accelerate Tech Adoption and Enable Digital for Your Enterprise

How GCC Can Accelerate Tech Adoption and Enable Digital for Your Enterprise

Cyber Security & Privacy
June 11, 2025 18 0

Maintaining a competitive edge in the aftermath of the pandemic has required enterprises to lean heavily on Managed GICs. Indian GIC service providers have rebounded from the slump induced by COVID-19 and returned to their growth ...


The Quiet SSL Revolution Powering Internal Apps – 4 Case Studies

The Quiet SSL Revolution Powering Internal Apps – 4 Case Studies

Mobile & Web Development Cyber Security & Privacy
May 28, 2025 13 0

Securing internal web applications—whether they’re behind a firewall or only accessible within a company network—can be surprisingly complex. Most public SSL certificate providers don’t support non-public domains, and self-signed ...


Why Your Zero Trust Security Model Fails Without Intranet SSL

Why Your Zero Trust Security Model Fails Without Intranet SSL

Data Privacy Cyber Security & Privacy
May 22, 2025 55 0

You've segmented your networks, tightened firewall rules, and implemented multi-factor authentication (MFA) for external access—but are your internal dashboards, APIs, and admin panels still using HTTP or self-signed SSL certifica...


Insights from the Frontlines: Q1 2025's New GCC Arrivals

Insights from the Frontlines: Q1 2025's New GCC Arrivals

Cyber Security & Privacy Data Science & AI Community GCC Global Capability Centers
May 21, 2025 840 0

In the first quarter of 2025, the Global Capability Centers (GCCs) landscape in India witnessed significant expansion with 16+ new GCCs established, reflecting a robust growth trajectory and underscoring India’s pivotal role in gl...


Continuous Compliance in DevOps

Continuous Compliance in DevOps

Cyber Security & Privacy DevOps
May 21, 2025 13 0

To make the software development process faster, the world started adopting DevOps, and the DevOps culture revolves around one word - ‘continuous’. Be it development, testing, deployment, integration, or security, DevOps has alway...


Logistics Cybersecurity with IT Staff Augmentation

Logistics Cybersecurity with IT Staff Augmentation

Cyber Security & Privacy
May 15, 2025 5 0

The logistics industry maintains essential functions for global trade as it allows product movements between different international borders. Security threats against businesses keep rising because technology has become essential ...


Current best practices for proactive cyber hygiene and threat monitoring

Current best practices for proactive cyber hygiene and threat monitoring

Cyber Security & Privacy
May 15, 2025 1737 0

Countries worldwide are increasingly relying on digital infrastructure. India is also the world’s largest digital democracy, with its internet landscape projected to reach over 900 million users by 2025. Unfortunately, the growing...


Tech Talks | Reimagining Security : An Era Powered by Generative AI [Part 1]

Tech Talks | Reimagining Security : An Era Powered by Generative AI [Part 1]

Cyber Security & Privacy nasscom insights
May 15, 2025 1625 0

In the Video Haripriya Kanduri - Vice President, Head of Cybersecurity, CIS, India , Capgemini Pooja Bhattacharjee - Project Manager, System Plus Solutions Vishal Gupta - Program Manager, AI & Cybersecurity, Bosch Sneha...


The ROI of Intelligent Access Management (IAM)

The ROI of Intelligent Access Management (IAM)

Cyber Security & Privacy
May 13, 2025 12 0

Imagine a growing organization struggling to manage who gets access to what systems. Manual approval processes strain employees, the IT team is stretched thin, and a missed compliance step leaves the company vulnerable to fines or...


© Copyright nasscom. All Rights Reserved.