Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Malware Analysis Behavioral Detection and Prevention on Bayesian Network Using Machine Learning

Malware Analysis Behavioral Detection and Prevention on Bayesian Network Using Machine Learning

Cyber Security & Privacy Big Data Analytics
July 21, 2025 94 0 Read Article

An Abstract  A signature-based analysis is no longer sufficient to counter the stealthy and polymorphic nature of malware attacks. As a result, the usage of behavioral or anomalous analysis offers a more adaptive and effec...


The CrowdStrike conundrum

The CrowdStrike conundrum

IT Services Cyber Security & Privacy
July 17, 2025 69 0 Read Article

A rainy Friday morning took an unexpected turn when a system failure announcement disrupted my usual pre-flight routine at the airport. At first, I didn't realize the extent of the issue, but then notifications started flooding in...


Evaluating Global CBPR, PRP, and CAPE for India’s Personal Data Protection Ecosystem

Evaluating Global CBPR, PRP, and CAPE for India’s Personal Data Protection Ecosystem

Cyber Security & Privacy Public Policy
July 15, 2025 130 0 Read Article

As India moves towards implementation of the Digital Personal Data Protection Act (DPDPA), 2023, there is increasing interest in how international frameworks such as the Global Cross-Border Privacy Rules (CBPR), the Privacy Recogn...


Unified Data Fabric

Unified Data Fabric

Data Privacy Cyber Security & Privacy
July 11, 2025 24 0 Read Article

What is Unified Data Fabric? A Unified Data Fabric is an architectural framework that connects, integrates, and governs data across hybrid and multi-cloud environments—regardless of where it resides or what form it ta...


The Sovereign AI Paradox: Building Autonomy Without Breaking the Business

The Sovereign AI Paradox: Building Autonomy Without Breaking the Business

Cyber Security & Privacy Data Privacy
July 10, 2025 34 0 Read Article

In a world where AI defines global competitiveness, data sovereignty has emerged as both a policy mandate and a corporate ambition. Nations are building digital fortresses, while enterprises are racing to align their AI strategy w...


Quantum Computing

Quantum Computing

Data Privacy Cyber Security & Privacy
July 7, 2025 49 0 Read Article

What is Quantum Computing? Quantum computing is a revolutionary computing paradigm that leverages the principles of quantum mechanics—specifically superposition, entanglement, and quantum interference—to perform computations fa...


Customer Identity and Access Management Solutions to Build Better Customer Experiences and Trust

Customer Identity and Access Management Solutions to Build Better Customer Experiences and Trust

Cyber Security & Privacy
July 7, 2025 38 0 Read Article

Introduction Customers are the bread and butter of any business. Their point of view is critical today, with customer experience becoming more important than individual transactions. Digital platforms have made the customer mor...


Personalized Data Policy Creation & Workflow

Personalized Data Policy Creation & Workflow

Cyber Security & Privacy Data Privacy
July 2, 2025 40 0 Read Article

What is Personalized Data Policy Creation & Workflow? Personalized Data Policy Creation & Workflow refers to the ability to design, implement, and automate data governance policies that are tailored to specific datasets...


OT SOC for Utilities: Making Resilient Energy Infrastructures

OT SOC for Utilities: Making Resilient Energy Infrastructures

Cyber Security & Privacy Energy & Utilities
July 2, 2025 117 0 Read Article

As the energy sector is accelerating its digital transformation journey, Operational Technology (OT) networks, which were historically isolated, are now increasingly converging with IT systems. This convergence, on one side, bring...


Protected Health Information (PHI)

Protected Health Information (PHI)

Cyber Security & Privacy HealthTech and Life Sciences
July 1, 2025 42 0 Read Article

What is PHI? Protected Health Information (PHI) refers to any health-related data that can be linked to an individual and is governed by regulations such as the Health Insurance Portability and Accountability Act (HIPAA) in the...


© Copyright nasscom. All Rights Reserved.