Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Top 5 reasons why cybersecurity is important for businesses

Top 5 reasons why cybersecurity is important for businesses

Cyber Security & Privacy
May 4, 2022 3229 0

Cyber-attacks are now one of the most pressing issues for both large and small-scale businesses. With companies increasingly relying on different technologies, the risk of cyberthreats doesn’t seem to stop. Hence, businesses need ...


BE CYBERSAFE - FIGHT MITM(MAN IN THE MIDDLE ATTACK)

BE CYBERSAFE - FIGHT MITM(MAN IN THE MIDDLE ATTACK)

Cyber Security & Privacy
April 29, 2022 235 0

Man-in-the-Middle Attacks A man in the middle (MITM) attack occurs when a perpetrator inserts himself into a communication between a user and an application, either to listen in or to mimic one of the parties, making it appear ...


What is Zero Trust and how does it work?

What is Zero Trust and how does it work?

Cyber Security & Privacy
April 21, 2022 237 0

Now more than ever, organizations are increasingly trying to understand the concept of ‘Zero Trust’ and how it can be used to bolster the security of their data and systems. No doubt, a zero-trust strategy can safeguard any type o...


What is Privacy Engineering and how it acts as an enabler of Digital Innovation?

What is Privacy Engineering and how it acts as an enabler of Digital Innovation?

Cyber Security & Privacy
April 20, 2022 303 0

 In different parts of the world, privacy laws have been in development over the last 50 years or so. But Privacy Engineering is a relatively new concept that is experiencing a rapid rise in relevance due to lots of changes a...


A Fine Balance

A Fine Balance

Data Privacy Cyber Security & Privacy
April 19, 2022 258 0

  Policymakers, Big Tech, digital entrepreneurs and civil rights activists across the globe are engaged in debates about Data Privacy. In an increasingly digital world, companies and administrations need to collect data to...


Securing IoTs with Blockchain

Securing IoTs with Blockchain

Cyber Security & Privacy
April 14, 2022 192 0

IoTs are popular with companies worldwide. Whether it is monitoring equipment, improving customer engagement or optimizing company floor plans, and mobilizing office resources, IoTs empower businesses with a wealth of data. Des...


Security-as-a-Service (SECaaS) - A Detailed Overview

Security-as-a-Service (SECaaS) - A Detailed Overview

Cyber Security & Privacy
April 13, 2022 6868 0

Whether you understand cloud computing or not, if you are savvy enough to use a smartphone or a laptop, chances are you already use cloud computing services. For example, if you have used Amazon.com or any Google Application or Mi...


NextGen IAM – Your Catalyst For Digital Transformation

NextGen IAM – Your Catalyst For Digital Transformation

Digital Transformation Emerging Tech Cyber Security & Privacy
April 8, 2022 218 0

New entrants in the market are taking a digital first strategy by embodying digital processes upfront. Quite a few of the new kids on the block have adopted a completely radical approach to solving an existing problem by going dig...


Forget passwords to improve security #biometrics #MFA #SSO

Forget passwords to improve security #biometrics #MFA #SSO

Cyber Security & Privacy
March 21, 2022 231 0

Digital transformation has gained unprecedented momentum in the past couple of years with businesses striving to remain on the edge, to deal with evolving challenges and gain a competitive advantage.  This has resulted in ...


Powering digital experiences across the ITeS sector in an era of tech intensity

Powering digital experiences across the ITeS sector in an era of tech intensity

Cyber Security & Privacy Digital Transformation Cloud Computing
March 11, 2022 5364 1

  Powering digital experiences across the ITeS sector in an era of tech intensity With tech intensity becoming a strong driver to build a culture of innovation, ITeS companies are transforming themselves as disruption d...


© Copyright nasscom. All Rights Reserved.