Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Data Disposal : Your sensitive data is at high RISK !

Data Disposal : Your sensitive data is at high RISK !

Cyber Security & Privacy Data Privacy
January 20, 2023 317 1

Data is the oxygen for digital world. Technology has evolved immensely in last 20 odd years. From large mainframes to desktop computers, laptops to smartphones, data centers to cloud, tablets to smart watches, google search to ...


Top 10 cloud trends for 2023

Top 10 cloud trends for 2023

Cyber Security & Privacy Data Science & AI Community Digital Transformation Fintech Tech for Good Emerging Tech Cloud Computing
January 6, 2023 859 0

Most of the revolutionary technological trends of recent times, like artificial intelligence, machine learning, and FinOps, have been greatly influenced by the widespread adoption of cloud computing. Gartner forecasts th...


Cybersecurity Consolidation: Enabling a competitive edge and offering opportunities (DSCI-Qualys POV)

Cybersecurity Consolidation: Enabling a competitive edge and offering opportunities (DSCI-Qualys POV)

Cyber Security & Privacy
December 2, 2022 1776 0

Over the last decade, the technology sector has grown significantly, with the advent of the next-generation technology stack and products, enterprises have moved towards digitalization. Consolidation is a process of combining and ...


Understanding Cyberattacks

Understanding Cyberattacks

Cyber Security & Privacy
December 1, 2022 224 1

As advancements in digital technology have revolutionized businesses across all sectors, this progress has also introduced new risks relating to cybercrime. In recent times, cyberattacks across the globe have crippled large multin...


Modernizing Cyber Risk Management

Modernizing Cyber Risk Management

Cyber Security & Privacy
December 1, 2022 200 1

As global markets evolve, organizations must adapt and modernize their approach to risk management. While increasing your business’s cyber presence can create a world of opportunities, leaders must exercise caution when weighing t...


How Software Performance Testing Can Help Your Business Succeed

How Software Performance Testing Can Help Your Business Succeed

Cyber Security & Privacy
November 28, 2022 1177 0

Holiday time is quickly approaching. If you own a digital business, you should prepare for the yearly spikes in activity and demand from your clients. While ten years ago that might’ve meant hiring temporary staff to help manage t...


What is the difference Between Backup and Disaster Recovery?

What is the difference Between Backup and Disaster Recovery?

Cyber Security & Privacy Cloud Computing
November 22, 2022 360 0

Data losses are prevalent today, and cyber attacks have increased in recent years. Organizations' data has to be protected and available always. Data Backup should be an essential part of any organization's IT strategy. It is also...


SBOMs - What's the buzz?

SBOMs - What's the buzz?

Cyber Security & Privacy Project Management
October 13, 2022 216 0

Organizations are looking at more intelligent ways to strengthen their software supply chains due to the increased cyberattacks. The Apache Log4j zero-day vulnerability – one of the most talked about incidents in recent years shoo...


Top 6 Cybersecurity Vulnerabilities

Top 6 Cybersecurity Vulnerabilities

Cyber Security & Privacy
October 10, 2022 163 0

While data is being considered an asset in the IT ecosystem, the role of cybersecurity in maintaining enterprise operations has become more pertinent. Organizations need to be able to protect both customer and employee data from s...


Cloud Security Framework: A layered approach to secured by design

Cloud Security Framework: A layered approach to secured by design

Cyber Security & Privacy Data Privacy Cloud Computing
October 2, 2022 474 0

Cloud Security framework employs a series of mechanisms to slow the advance an attack aimed at unauthorized access to information in the cloud environment. Each layer provides a mechanism such that if one layer is breached, a subs...


© Copyright nasscom. All Rights Reserved.