Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Cloud Security: Safeguarding Data in the Digital Sky

Cloud Security: Safeguarding Data in the Digital Sky

Data Privacy Cyber Security & Privacy
April 9, 2025 19 0

As organizations around the world adopt digital transformation, cloud computing has become a fundamental component of modern IT infrastructure. It provides exceptional scalability, flexibility, and cost efficiency, allowing b...


Zero Trust Cybersecurity for Financial Services: A Strategic Perspective

Zero Trust Cybersecurity for Financial Services: A Strategic Perspective

Cyber Security & Privacy
April 7, 2025 10 0

  Introduction In today’s financial services landscape, digital transformation is reshaping how institutions operate, creating an increasingly interconnected ecosystem. With this evolution comes a intensified need for a...


The Role of IT/OT convergence in enhancing cyber security in Power Utilities 

The Role of IT/OT convergence in enhancing cyber security in Power Utilities 

Cyber Security & Privacy Digital Transformation
April 3, 2025 158 0

In the context of utilities, cyber posture refers to an organization's overall cybersecurity readiness and resilience against cyber threats. It encompasses the people, processes, and technologies safeguarding systems, networks, an...


Breaking Open the AI Black Box: The Push for Transparency

Breaking Open the AI Black Box: The Push for Transparency

Cyber Security & Privacy AI
April 1, 2025 7 0

Authored by: Suresh Bansal, Technical Manager - Xoriant For years, AI has remained shrouded in technical complexity, deeply embedded in engineering frameworks that only a handful of experts truly understand. For the averag...


ISO 27001:2022 Clause 4.2 – How Understanding Stakeholder Needs Strengthens Your ISMS

ISO 27001:2022 Clause 4.2 – How Understanding Stakeholder Needs Strengthens Your ISMS

Cyber Security & Privacy
March 23, 2025 15 0

In ISO 27001:2022, Clause 4.2 emphasizes a critical aspect of building a successful Information Security Management System (ISMS): understanding the needs and expectations of interested parties. 🔍 Who Are Interested Parties? ...


Can We Trust AI? The Growing Concerns Among Indians

Can We Trust AI? The Growing Concerns Among Indians

Cyber Security & Privacy Cloud Computing
March 20, 2025 40 0

Artificial Intelligence (AI) is no longer a futuristic concept; it is a reality deeply integrated into our daily lives. From voice assistants to predictive analytics, AI is transforming industries, enhancing efficiency, and stream...


Toward a Safer World With Digital Forensics

Toward a Safer World With Digital Forensics

Cyber Security & Privacy Emerging Tech Engineering Research & Design
March 6, 2025 46 0

With technology redefining every aspect of daily life, the scope of crime has evolved. Statistics indicate that 422 million individuals were impacted in 2022 alone, with costs running into trillions of dollars. To und...


Cybersecurity Risk vs Vulnerability vs Threat: What are the Differences?

Cybersecurity Risk vs Vulnerability vs Threat: What are the Differences?

Threat Intelligence Cyber Security & Privacy
March 6, 2025 18 0

In the intricate realm of cybersecurity, grasping the differences between risk, vulnerability, and threat is vital for solid protection. Each term signifies a distinct aspect of potential harm within the digital landscape, influen...


Strengthening Your Cybersecurity: Why it Matters More than Ever

Strengthening Your Cybersecurity: Why it Matters More than Ever

Data Privacy Cyber Security & Privacy
March 5, 2025 21 0

In today’s interconnected world, cybersecurity is no longer optional- it’s a necessity. As we increasingly rely on digital platforms for communication, commerce, and entertainment, the risks associated with cyber threats continue ...


Java Spring security with custom authentications

Java Spring security with custom authentications

Application Cyber Security & Privacy
March 4, 2025 13 0

Security in modern web applications is critical because these applications often handle sensitive data, including personal information, financial details, and intellectual property. Any breach can lead to significant harm for user...


© Copyright nasscom. All Rights Reserved.