Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Evolution of Cyber Security in the Post-Covid World: Proactive Approach is a Must

Evolution of Cyber Security in the Post-Covid World: Proactive Approach is a Must

Cyber Security & Privacy
July 7, 2021 618 0

The concept of a “Proactive Approach to Cyber Security” is not new but seldom applied since most organizations had and still have a reactive cyber security strategy in place. As a result of which a majority of businesses suffered ...


Data Security Challenges in 2021 and How to Handle Them

Data Security Challenges in 2021 and How to Handle Them

Cyber Security & Privacy
June 30, 2021 39 0

Back in 2011, Gmail’s servers ran into a problem. Their employees were propagating a software update across their servers, but there was a glitch in the update.  In an instant, over 20,000 people lost all their emails.&nbs...


DevOps and Cybersecurity: What are the New Challenges and Solutions in IT Security

DevOps and Cybersecurity: What are the New Challenges and Solutions in IT Security

IT Services DevOps Cyber Security & Privacy
June 29, 2021 1336 0

Cybersecurity is a growing concern in today’s digital landscape. Hackers are getting smarter every day, making it vital for security professionals to be even more innovative. They need to take preventive measures before threats fr...


Building Resilience in Business Eco-System

Building Resilience in Business Eco-System

COVID-19 Cyber Security & Privacy Digital Payment Safety BFSI BPM
June 24, 2021 72 0

With the outbreak of the pandemic, the world is clearly confronted with a new, challenging, and unpredictable occurrence. Consumers in the "New Normal" have different decision-making processes than in the pre-pandemic era, thus ha...


Leveraging The Power Of Image Tokens

Leveraging The Power Of Image Tokens

Cyber Security & Privacy
June 23, 2021 414 1

Securing personally identifiable information (PII) has come into existence since the inception of GDPR. However, data protection has been a subject of study since 400BC, when messages were first inscribed in tapered batons for sec...


Top 6 common flaws in web application security and their resolution

Top 6 common flaws in web application security and their resolution

Mobile & Web Development Cyber Security & Privacy
June 23, 2021 229 0

Web applications are increasingly becoming more feature rich, powerful, and complex. This complexity in web applications is a result of the rising technological demands of the customers. To meet their customers’ demands, organizat...


Your business-critical data could get exposed. Are you prepared?

Your business-critical data could get exposed. Are you prepared?

IT Services Cyber Security & Privacy
June 21, 2021 20 0

Introduction Critical data are the information that is crucial to the operational administration of a business. If the data gets compromised, the business becomes exposed to a risk that could lead to various sublime crises such...


Zero-Trust Security in the Post-Pandemic Era: Eight Steps Implementation Guide

Zero-Trust Security in the Post-Pandemic Era: Eight Steps Implementation Guide

Cyber Security & Privacy
June 18, 2021 342 0

Never Trust, always Verify, and again Re-Verify!!! The global pandemic has changed the way we look at technology and business requirements. Everything is now moving to a cloud right from the way we work, access to dat...


Need to measure cybersecurity risks

Need to measure cybersecurity risks

Cyber Security & Privacy
June 13, 2021 20 0

Every time there’s another massive cybersecurity breach, which like SolarWinds finds its roots in a security issue at a third party, policymakers and security experts ask, “Where do we go from here?”    The private...


Changing dynamics of cybersecurity

Changing dynamics of cybersecurity

Cyber Security & Privacy
June 13, 2021 52 0

In the last 20 years, cybersecurity has certainly changed; in the last year, an evolution has occurred that is more frightening than the last 20 years combined.   A threat actor in the past who could detect and exploit ...


© Copyright nasscom. All Rights Reserved.