Header Banner Header Banner
Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Quantum Supremacy: Breaking Barriers in Computational Power

Quantum Supremacy: Breaking Barriers in Computational Power

Cyber Security & Privacy
September 2, 2025 73 0 Read Article

Quantum Supremacy: Breaking Barriers in Computational Power For decades, scientists and engineers have been inching toward a vision of computing that could solve problems far beyond the reach of classical machines. That dream t...


Intelligent Audit Models: Enabling AI-Ready, Digitally Resilient Data Centers

Intelligent Audit Models: Enabling AI-Ready, Digitally Resilient Data Centers

Data Privacy Threat Intelligence Digital Transformation AI IT Services Cyber Security & Privacy
August 25, 2025 696 0 Read Article

AI AS THE DEFINING FORCE OF GOVERNANCE Artificial intelligence is no longer confined to chatbots, automation scripts, or headline-grabbing innovations. A quieter, yet more profound revolution is underway in how data centers the...


6 Application Security Best Practices to Protect Your Digital Assets

6 Application Security Best Practices to Protect Your Digital Assets

Application Cyber Security & Privacy
August 25, 2025 26 0 Read Article

With cyberattacks and illegal access attempts on the rise, organizations must take proactive steps to safeguard their digital assets and protect sensitive data. A core aspect of cybersecurity is application security, whi...


MSSPs: The Strategic Advantage CISOs Need in a Hyper-Threatened Landscape

MSSPs: The Strategic Advantage CISOs Need in a Hyper-Threatened Landscape

Cyber Security & Privacy
August 7, 2025 123 0 Read Article

CISOs (Chief Information Security Officers) are in a constant battle against an increasingly complex threat landscape. From AI-driven attacks and sophisticated ransomware to growing supply chain vulnerabilities, their daily realit...


From Control to Capability: The Strategic Role of Identity and Access Management

From Control to Capability: The Strategic Role of Identity and Access Management

Cyber Security & Privacy
August 6, 2025 97 0 Read Article

As digital operations expand, enterprises are navigating increasingly fragmented access environments. Cloud-first deployments, distributed workforces, and partner ecosystems have stretched traditional identity controls beyond thei...


Why 2025 is a make-or-break year for cyber resilience—and why most firms aren’t ready

Why 2025 is a make-or-break year for cyber resilience—and why most firms aren’t ready

AI Cyber Security & Privacy
July 31, 2025 184 0 Read Article

As generative AI transforms business capabilities, it simultaneously reshapes the threat landscape. Attackers are leveraging these tools to automate reconnaissance, develop highly personalized phishing campaigns, and manipulate da...


Secure Access Redefined: Why Passwordless Is Now Non-Negotiable for IAM Strategy

Secure Access Redefined: Why Passwordless Is Now Non-Negotiable for IAM Strategy

Cyber Security & Privacy
July 30, 2025 2049 0 Read Article

In the dynamic world of cybersecurity, conventional wisdom often lags behind evolving threats. For too long, the humble password has been the frontline defense for digital identities. Yet, its inherent vulnerabilities and the incr...


Model Context Protocols: The Global Standard for Agentic Communication or a New Security Loophole?

Model Context Protocols: The Global Standard for Agentic Communication or a New Security Loophole?

Cyber Security & Privacy Data Privacy Threat Intelligence Data Science & AI Community Digital Transformation AI nasscom insights Emerging Tech
July 30, 2025 178 1 Read Article

As Agentic AI continues to evolve, numerous protocols are emerging that enable autonomous communication and coordination. These protocols enable agents to independently discover, select and allocate resources without requiring hum...


Information Security in India: A Strategic Imperative for CISOs and CIOs

Information Security in India: A Strategic Imperative for CISOs and CIOs

Data Privacy Cyber Security & Privacy
July 28, 2025 88 0 Read Article

Why ISO/IEC 27001 is more than just a compliance badge Introduction: the risk landscape has changed — have you? India’s digital economy is booming — but so are its cyber risks. In 2023 alone, India ranked third globally in c...


Malware Analysis Behavioral Detection and Prevention on Bayesian Network Using Machine Learning

Malware Analysis Behavioral Detection and Prevention on Bayesian Network Using Machine Learning

Cyber Security & Privacy Big Data Analytics
July 21, 2025 144 0 Read Article

An Abstract  A signature-based analysis is no longer sufficient to counter the stealthy and polymorphic nature of malware attacks. As a result, the usage of behavioral or anomalous analysis offers a more adaptive and effec...


© Copyright nasscom. All Rights Reserved.