Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Powering digital experiences across the ITeS sector in an era of tech intensity

Powering digital experiences across the ITeS sector in an era of tech intensity

Cyber Security & Privacy Digital Transformation Cloud Computing
March 11, 2022 5364 1

  Powering digital experiences across the ITeS sector in an era of tech intensity With tech intensity becoming a strong driver to build a culture of innovation, ITeS companies are transforming themselves as disruption d...


Why ‘identity-first’ is the new mantra to ensure security across hybrid workspace?

Why ‘identity-first’ is the new mantra to ensure security across hybrid workspace?

Cyber Security & Privacy
March 9, 2022 248 0

Credential theft has witnessed a meteoric rise in the past couple of years with the surge in remote work. Reports suggest over 4/5th of data breaches resulting from hacking involve the use, or misuse, of l...


BE CYBERSAFE - FIGHT RANSOMWARE

BE CYBERSAFE - FIGHT RANSOMWARE

Cyber Security & Privacy
February 22, 2022 457 0

SYSTEM BASED ATTACK-RANSOMWARE Ransomware is a sort of attack that has grown in importance as a danger to both businesses and individuals in the last two years. The majority of contemporary ransomware variations encrypt files o...


BE CYBERSAFE - FIGHT DNS SPOOFING

BE CYBERSAFE - FIGHT DNS SPOOFING

Digital Transformation Cyber Security & Privacy
February 13, 2022 235 0

SYSTEM BASED ATTACK- DNS SPOOFING What is domain name system (DNS) spoofing Domain Name Server (DNS) spoofing (a.k.a. DNS cache poisoning) is an attack in which altered DNS records are used to redirect online traffic to a fr...


BE CYBERSAFE - FIGHT PHISHING

BE CYBERSAFE - FIGHT PHISHING

Cyber Security & Privacy
February 3, 2022 319 1

WEB BASED ATTACK- PHISHING What is phishing attack?   Phishing is a type of social engineering assault that is frequently used to obtain sensitive information from users, such as login credentials and credit card det...


What is Operational Technology (OT) Cybersecurity?

What is Operational Technology (OT) Cybersecurity?

Cyber Security & Privacy
January 28, 2022 539 0

Operational technology (OT) cybersecurity includes the processes that involve the discovery, monitoring, and remediation of network-connected OT devices affected by unusual behavior. OT can be defined as the network-connected d...


Cybersecurity in 2022: Have You Prepared Your Security Checklist?

Cybersecurity in 2022: Have You Prepared Your Security Checklist?

Cyber Security & Privacy
January 28, 2022 3465 0

  2022 is all set to be another eventful and somewhat terrifying year, for the entire world, from the growth and security point of view. The new variant of COVID-19 is showing no signs of slowing down, raising complication...


Cyber Security – an Attacker view post-pandemic

Cyber Security – an Attacker view post-pandemic

Cyber Security & Privacy
January 7, 2022 361 0

We have entered an era of digital disruption, where commerce and industries are moving from traditional ways of working towards adopting more agile and flexible frameworks to stay competitive and relevant. This rapid adoption of...


Strategies for leveraging Cyber Security for a study

Strategies for leveraging Cyber Security for a study

Cyber Security & Privacy
January 7, 2022 422 0

  Cybersecurity is among the most popular topics on the internet, and it's not without reason, as it's an ever-changing subject with new challenges appearing every day. The good news is that experts in the field have alway...


The IoT Sector Progression and Rising Security Concerns

The IoT Sector Progression and Rising Security Concerns

IOT Cyber Security & Privacy
December 24, 2021 5323 1

  The technical sphere is subjected to experiments every passing day. As a result, new technologies are being discovered and the existing ones are refined to perfection.       One of the prom...


© Copyright nasscom. All Rights Reserved.