Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
MOBILE FORENSICS TOOLS AND TECHNIQUES

MOBILE FORENSICS TOOLS AND TECHNIQUES

Cyber Forensics Cyber Security & Privacy
May 27, 2022 1955 1

Data acquisition is that the method of gathering information from mobile devices and their associated media. This method reduces the possibilities of information loss thanks to injury or battery depletion throughout storage and tr...


Managing healthcare cybersecurity in 2022 pt.1

Managing healthcare cybersecurity in 2022 pt.1

HealthTech and Life Sciences Cyber Security & Privacy
May 25, 2022 291 1

With significant data breaches hitting the headlines each year, healthcare cybersecurity is a major and expanding area for investment. Some experts predict the market will grow by almost 20% over the next five years, and it’s not ...


Understanding Client Credentials Flow in OAuth 2.0

Understanding Client Credentials Flow in OAuth 2.0

Cyber Security & Privacy
May 12, 2022 313 0

Client credentials flow in OAuth 2.0 is generally used for authenticating the service rather than the user. This grant_flow is used for machine-to-machine communication. In this grant flow, the cli...


BE CYBERSAFE - FIGHT SQL INJECTION

BE CYBERSAFE - FIGHT SQL INJECTION

Cyber Security & Privacy
May 10, 2022 268 0

Web based attack - SQL Injection (SQLi) SQL Injection (SQLi) is a type of injection attack that allows malicious SQL commands to be executed. These commands are used to control a database server that is connected to a web appli...


Top 5 reasons why cybersecurity is important for businesses

Top 5 reasons why cybersecurity is important for businesses

Cyber Security & Privacy
May 4, 2022 3205 0

Cyber-attacks are now one of the most pressing issues for both large and small-scale businesses. With companies increasingly relying on different technologies, the risk of cyberthreats doesn’t seem to stop. Hence, businesses need ...


BE CYBERSAFE - FIGHT MITM(MAN IN THE MIDDLE ATTACK)

BE CYBERSAFE - FIGHT MITM(MAN IN THE MIDDLE ATTACK)

Cyber Security & Privacy
April 29, 2022 230 0

Man-in-the-Middle Attacks A man in the middle (MITM) attack occurs when a perpetrator inserts himself into a communication between a user and an application, either to listen in or to mimic one of the parties, making it appear ...


What is Zero Trust and how does it work?

What is Zero Trust and how does it work?

Cyber Security & Privacy
April 21, 2022 233 0

Now more than ever, organizations are increasingly trying to understand the concept of ‘Zero Trust’ and how it can be used to bolster the security of their data and systems. No doubt, a zero-trust strategy can safeguard any type o...


What is Privacy Engineering and how it acts as an enabler of Digital Innovation?

What is Privacy Engineering and how it acts as an enabler of Digital Innovation?

Cyber Security & Privacy
April 20, 2022 295 0

 In different parts of the world, privacy laws have been in development over the last 50 years or so. But Privacy Engineering is a relatively new concept that is experiencing a rapid rise in relevance due to lots of changes a...


A Fine Balance

A Fine Balance

Data Privacy Cyber Security & Privacy
April 19, 2022 258 0

  Policymakers, Big Tech, digital entrepreneurs and civil rights activists across the globe are engaged in debates about Data Privacy. In an increasingly digital world, companies and administrations need to collect data to...


Securing IoTs with Blockchain

Securing IoTs with Blockchain

Cyber Security & Privacy
April 14, 2022 190 0

IoTs are popular with companies worldwide. Whether it is monitoring equipment, improving customer engagement or optimizing company floor plans, and mobilizing office resources, IoTs empower businesses with a wealth of data. Des...


© Copyright nasscom. All Rights Reserved.