Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Personalized Data Policy Creation & Workflow

Personalized Data Policy Creation & Workflow

Cyber Security & Privacy Data Privacy
July 2, 2025 11 0

What is Personalized Data Policy Creation & Workflow? Personalized Data Policy Creation & Workflow refers to the ability to design, implement, and automate data governance policies that are tailored to specific datasets...


OT SOC for Utilities: Making Resilient Energy Infrastructures

OT SOC for Utilities: Making Resilient Energy Infrastructures

Cyber Security & Privacy Energy & Utilities
July 2, 2025 60 0

As the energy sector is accelerating its digital transformation journey, Operational Technology (OT) networks, which were historically isolated, are now increasingly converging with IT systems. This convergence, on one side, bring...


Protected Health Information (PHI)

Protected Health Information (PHI)

Cyber Security & Privacy HealthTech and Life Sciences
July 1, 2025 19 0

What is PHI? Protected Health Information (PHI) refers to any health-related data that can be linked to an individual and is governed by regulations such as the Health Insurance Portability and Accountability Act (HIPAA) in the...


?️ AI Adoption Is Racing Ahead — But Where’s the Risk Visibility?

?️ AI Adoption Is Racing Ahead — But Where’s the Risk Visibility?

AI Cyber Security & Privacy
June 26, 2025 44 1

AI is the new arms race. From generative copilots and internal chatbots to full-blown LLM integrations, organizations are moving fast to operationalize AI. For many, the pressure to adopt is intense — competitive threats, innov...


Eyes, Fingers, and Faces: The Trifecta of Biometric Security in Software and Cloud

Eyes, Fingers, and Faces: The Trifecta of Biometric Security in Software and Cloud

Emerging Tech Cyber Security & Privacy
June 21, 2025 751 0

In today’s digital landscape, where nearly every interaction leaves an online trace, safeguarding our digital environments is more crucial than ever. As we navigate personal and professional realms, technology offers innovation wh...


Cybersecurity Risk Assessment: A Step-by-Step Guide

Cybersecurity Risk Assessment: A Step-by-Step Guide

Cyber Security & Privacy
June 21, 2025 14 0

In an era where cyber threats evolve daily, protecting your digital assets isn’t optional — it's critical. According to IBM’s 2024 Cost of a Data Breach Report, the average breach now costs $4.45 million — a staggering reminder th...


Leading the way on Artificial Intelligence : How best performers approach and manage AI

Leading the way on Artificial Intelligence : How best performers approach and manage AI

Cyber Security & Privacy Data Science & AI Community
June 12, 2025 653 1

The respondents in this survey work for companies at different stages of the artificial intelligence (AI) journey who primarily operate in the IT sector or develop AI systems. For the purpose of this report, the companies are divi...


How GCC Can Accelerate Tech Adoption and Enable Digital for Your Enterprise

How GCC Can Accelerate Tech Adoption and Enable Digital for Your Enterprise

Cyber Security & Privacy
June 11, 2025 105 0

Maintaining a competitive edge in the aftermath of the pandemic has required enterprises to lean heavily on Managed GICs. Indian GIC service providers have rebounded from the slump induced by COVID-19 and returned to their growth ...


The Quiet SSL Revolution Powering Internal Apps – 4 Case Studies

The Quiet SSL Revolution Powering Internal Apps – 4 Case Studies

Mobile & Web Development Cyber Security & Privacy
May 28, 2025 16 0

Securing internal web applications—whether they’re behind a firewall or only accessible within a company network—can be surprisingly complex. Most public SSL certificate providers don’t support non-public domains, and self-signed ...


Why Your Zero Trust Security Model Fails Without Intranet SSL

Why Your Zero Trust Security Model Fails Without Intranet SSL

Data Privacy Cyber Security & Privacy
May 22, 2025 59 0

You've segmented your networks, tightened firewall rules, and implemented multi-factor authentication (MFA) for external access—but are your internal dashboards, APIs, and admin panels still using HTTP or self-signed SSL certifica...


© Copyright nasscom. All Rights Reserved.