Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
What is the difference Between Backup and Disaster Recovery?

What is the difference Between Backup and Disaster Recovery?

Cyber Security & Privacy Cloud Computing
November 22, 2022 355 0

Data losses are prevalent today, and cyber attacks have increased in recent years. Organizations' data has to be protected and available always. Data Backup should be an essential part of any organization's IT strategy. It is also...


SBOMs - What's the buzz?

SBOMs - What's the buzz?

Cyber Security & Privacy Project Management
October 13, 2022 211 0

Organizations are looking at more intelligent ways to strengthen their software supply chains due to the increased cyberattacks. The Apache Log4j zero-day vulnerability – one of the most talked about incidents in recent years shoo...


Top 6 Cybersecurity Vulnerabilities

Top 6 Cybersecurity Vulnerabilities

Cyber Security & Privacy
October 10, 2022 163 0

While data is being considered an asset in the IT ecosystem, the role of cybersecurity in maintaining enterprise operations has become more pertinent. Organizations need to be able to protect both customer and employee data from s...


Cloud Security Framework: A layered approach to secured by design

Cloud Security Framework: A layered approach to secured by design

Cyber Security & Privacy Data Privacy Cloud Computing
October 2, 2022 453 0

Cloud Security framework employs a series of mechanisms to slow the advance an attack aimed at unauthorized access to information in the cloud environment. Each layer provides a mechanism such that if one layer is breached, a subs...


Cybersecurity Trends in 2022

Cybersecurity Trends in 2022

Cyber Security & Privacy
September 12, 2022 1168 0

Cyber threats have exponentially grown as a major concern as the world becomes increasingly digital and data reliant, and this is no less true in India. According to India’s Computer Emergency Response Team (CERT-In), India faced ...


The Cyber Security Challenge in a Hybrid World

The Cyber Security Challenge in a Hybrid World

Digital Transformation Cyber Security & Privacy
September 7, 2022 243 0

The new normal of hybrid work comes with security concerns and operational complexity. These need to be mitigated with the right technology interventions The global health crisis has made organizations realize the true value of...


HOW DATA SECURITY WORKS?

HOW DATA SECURITY WORKS?

Data Privacy Data Privacy Cyber Security & Privacy
September 6, 2022 209 0

WHAT IS DATA SECURITY? In recent years with emerging cloud technologies, security threats over data are constantly rising. Whether you run your application in private, public or hybrid infrastructure. Integrations with differen...


A peek into AI as the future of cybersecurity

A peek into AI as the future of cybersecurity

Cyber Security & Privacy
September 2, 2022 276 0

A peek into AI as the future of cybersecurity An increase in the number of cyber-attacks globally has bred cybercrime as world’s third largest economy after the US and China. These attacks have not just increased in number but ...


RBAC for frontend and backend using Keycloak

RBAC for frontend and backend using Keycloak

Data Privacy Data Privacy Cyber Security & Privacy
September 2, 2022 579 0

User authentication is necessary to safeguard your organization's data and systems. Granting system/data access to a person that he is not supposed to access can be disastrous. Our study suggests that 82% of breaches are caused du...


How Blockchain Technology is Redefining Cybersecurity Solutions

How Blockchain Technology is Redefining Cybersecurity Solutions

Cyber Security & Privacy
September 2, 2022 7255 0

Every area of civilization has been influenced by technology. It has transformed communication, increased our ability to travel, and even affected social change inside our civilizations. The more the growth of technology, the grea...


© Copyright nasscom. All Rights Reserved.