Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
The Transformative Impact of AI on Cybersecurity Practices

The Transformative Impact of AI on Cybersecurity Practices

Cyber Security & Privacy
October 17, 2024 11 0

In the world of digital business today, keeping your data safe via cybersecurity is a non-negotiable for companies of any scale. With cyber threats evolving unprecedentedly, enterprises constantly seek innovative solutions to prot...


The five DevSecOps anti-patterns you must avoid

The five DevSecOps anti-patterns you must avoid

Cloud Computing Cyber Security & Privacy Data Privacy Data Privacy DevOps
October 16, 2024 79 0

You might be wondering why we need to talk about anti-patterns when we could discuss the patterns. Think of it this way: Anti-patterns are like the "-5" of the process. If non-DevSecOps practices are a "0," we're not even at neutr...


Guardians of Access: Navigating Identity and Access Management to Secure Your Digital Landscape

Guardians of Access: Navigating Identity and Access Management to Secure Your Digital Landscape

Data Privacy Cyber Security & Privacy
October 15, 2024 43 0

Authored by: Shekhar Joshi, VP of Technology and CISO - Xoriant As we recognize Cybersecurity Awareness Month, it’s an opportune time to talk about a critical component of security: Identity and Access Management (IAM). In...


Zero Trust Architecture: Why It's More Important Than Ever

Zero Trust Architecture: Why It's More Important Than Ever

Cyber Security & Privacy
October 8, 2024 78 0

Over the years, the rise of cloud computing, remote work, and IoT devices has expanded the attack surface of enterprises, leading to increased digital risks and cyber threats. Traditional perimeter-based security models, where tru...


Harnessing AI for a Smarter, Proactive Approach to Cybersecurity Incident Management

Harnessing AI for a Smarter, Proactive Approach to Cybersecurity Incident Management

Cyber Security & Privacy Threat Intelligence Data Science & AI Community Digital Transformation Emerging Tech IT Services AI
September 30, 2024 160 0

  In today's rapidly evolving digital landscape, cybersecurity incidents have become more sophisticated. Organizations across industries are witnessing increasingly complex and diverse cyberattacks, insider threats, and da...


Enhancing Security in Generative AI Applications: Key Risks and How to Manage Them

Enhancing Security in Generative AI Applications: Key Risks and How to Manage Them

AI Cyber Security & Privacy
September 24, 2024 57 0

  Authored by: Suresh Bansal, Technical Manager - Xoriant Security is critical for any application, especially as generative AI moves from academic research to real-world enterprise use. Large Language Models (LLMs) hav...


AI-driven vulnerability scanning: A new era of cybersecurity

AI-driven vulnerability scanning: A new era of cybersecurity

Cyber Forensics Data Privacy Threat Intelligence AI Machine Learning Cyber Security & Privacy
September 17, 2024 71 0

In a world where cyber threats are evolving rapidly, the practice of vulnerability scanning is undergoing a transformative revolution. Static defences and reactive measures are no longer efficient to discover threats. Today cybers...


DPDP Bill vs. Global Laws: A Comparative Analysis

DPDP Bill vs. Global Laws: A Comparative Analysis

G - Governance Cyber Security & Privacy
September 9, 2024 151 0

  India is rapidly evolving its regulatory landscape for data privacy. The Data Protection Personal Data Protection (DPDP) Bill is a significant development, introducing a comprehensive framework for data collection, stora...


How to choose the right vulnerability scanner for your security needs

How to choose the right vulnerability scanner for your security needs

Threat Intelligence Digital Transformation AI Machine Learning IT Services Cyber Security & Privacy
September 9, 2024 15 0

Organizations find safeguarding their infrastructure and applications complex as the digital landscape becomes increasingly complicated. Unaddressed vulnerabilities can lead to devastating consequences, including data breaches, op...


What are the Security Best Practices for Software Development?

What are the Security Best Practices for Software Development?

Cyber Security & Privacy
September 3, 2024 39 0

In this modern technological era, we depend on software for almost everything. However, this dependence has associated risks in the form of cyberattacks. They are too common and dangerous, making it essential to incorporate securi...


© Copyright nasscom. All Rights Reserved.