Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Windows CE End of Life: Transition Challenges for Medical Devices

Windows CE End of Life: Transition Challenges for Medical Devices

Cyber Security & Privacy HealthTech and Life Sciences
December 12, 2024 7 0

Windows CE, a widely used operating system in embedded systems, has reached its end of life, compelling medical device manufacturers to transition to a new platform. This shift not only presents a set of challenges but also opens ...


Generative AI in Cybersecurity: A Closer Look

Generative AI in Cybersecurity: A Closer Look

Cyber Security & Privacy AI
December 5, 2024 305 0

Cyber threats are evolving at an unprecedented pace, outmanoeuvring traditional defense mechanisms and turning the digital landscape into a complex battlefield. Generative AI emerges as a revolutionary force, redefining cybersecur...


The Role of AI in Technology: How Artificial Intelligence is Transforming Industries

The Role of AI in Technology: How Artificial Intelligence is Transforming Industries

Cyber Security & Privacy EdTech AI
November 26, 2024 48 0

Artificial intelligence is the technology that helps you in generating, classifying and performing a variety of advanced functions. It also includes understanding, translating spoken and written language, analyzing data, making re...


Efficiency in Compliance: The Role of CISO Dashboards in Regulatory Reporting

Efficiency in Compliance: The Role of CISO Dashboards in Regulatory Reporting

Data Privacy Cyber Security & Privacy
November 21, 2024 12 0

 Authored by: Shekhar Joshi, VP of Technology & CISO - Xoriant As cyberthreats evolve globally, both the frequency and sophistication of attacks are on the rise. Hackers now leverage advanced techniques, including...


Why Cybersecurity is Often Ignored

Why Cybersecurity is Often Ignored

Application Cyber Security & Privacy
November 8, 2024 36 0

In today's digital age, cybersecurity threats are more prevalent than ever. Cybercriminals are constantly evolving their tactics, making it increasingly difficult for organizations to keep up. Despite the rising risks, organizatio...


How Corporate-to-Bank Connectivity Drives Efficiency, Security, and Growth

How Corporate-to-Bank Connectivity Drives Efficiency, Security, and Growth

Data Privacy Cyber Security & Privacy
November 7, 2024 47 0

Authored by: Saurabh Kelkar, Product Marketing Manager - Xoriant As businesses push forward in the digital era, one of the most profound changes we’re seeing is the shift from manual tasks to automated, digital processes a...


The Future of Digital Transformation: Benefits of Azure Cloud Application Development

The Future of Digital Transformation: Benefits of Azure Cloud Application Development

Mobile & Web Development Cyber Security & Privacy
November 7, 2024 154 0

The Future of Digital Transformation: Benefits of Azure Cloud Application Development Digital transformation has emerged as an essential priority for companies trying to remain competitive and relevant as they continue to chang...


Building a Comprehensive Security Framework: Leveraging AI for Enhanced Data Protection

Building a Comprehensive Security Framework: Leveraging AI for Enhanced Data Protection

Cyber Security & Privacy Data Privacy Data Science & AI Community AI
October 30, 2024 188 0

By Deepam Kanjani, Principal Security Engineer, Snowflake   Introduction: Expanding the Scope of Security in Modern Data Platforms In today's fast-paced digital world, modern organizations face a growing number of secu...


Vulnerability scanning for maintaining compliance and regulations

Vulnerability scanning for maintaining compliance and regulations

Data Privacy Data Privacy Cyber Security & Privacy
October 29, 2024 2012 0

Vulnerability scanning's ultimate goal is to safeguard sensitive data. It is a critical component of any security strategy, enabling you to proactively identify and mitigate security vulnerabilities before they are exploited. The ...


Addressing IoT Cybersecurity Challenges to Protect Data in a Digital World

Addressing IoT Cybersecurity Challenges to Protect Data in a Digital World

Cyber Security & Privacy IOT
October 25, 2024 29 0

  In today's hyperconnected world, the Internet of Things is reshaping our lives. IoT devices are connected to everything that we perform daily, whether they are in the form of smart homes or industrial applications, and h...


© Copyright nasscom. All Rights Reserved.