Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Ethical implications of AI in software development: A call for responsible innovation

Ethical implications of AI in software development: A call for responsible innovation

Cyber Security & Privacy AI Inside AI
July 8, 2024 10 0

As passionate advocates for innovation in software development, we've witnessed the transformative potential of Artificial Intelligence (AI) firsthand. AI has rapidly evolved from a theoretical concept to a practical tool capable ...


Ensuring Data Security in Transit: Best Practices and Protocols

Ensuring Data Security in Transit: Best Practices and Protocols

Data Privacy Cyber Security & Privacy
July 5, 2024 23 0

In today's interconnected world, data is constantly on the move. Whether it's sensitive financial information, personal data, or proprietary business details, the transmission of data over networks is integral to modern operations...


 Empowering Cybersecurity Resilience Through Innovation: A Case Study in Enhanced Incident Management

Empowering Cybersecurity Resilience Through Innovation: A Case Study in Enhanced Incident Management

Cyber Forensics Data Privacy Fintech Cyber Security & Privacy
June 29, 2024 98 1

  Empowering Cybersecurity Resilience Through Innovation: A Case Study in Enhanced Incident Management   What if your organization's most sensitive data could be compromised simply because your incident manag...


How Fraud Analytics can Level up Outcomes in Healthcare Monitoring Schemes

How Fraud Analytics can Level up Outcomes in Healthcare Monitoring Schemes

Cyber Security & Privacy Emerging Tech HealthTech and Life Sciences
June 25, 2024 12 0

Governments worldwide, regardless of size and boundaries, design and deliver healthcare schemes with the best intent and integrity. They also establish efficient monitoring systems to expand coverage and improve outcomes. However,...


The Role of Data Ethics in Digital Marketing: Balancing Personalization with Privacy

The Role of Data Ethics in Digital Marketing: Balancing Personalization with Privacy

Sales & Marketing Cyber Security & Privacy
June 22, 2024 5226 1

In the fast-paced world of digital marketing, data ethics have become a hot topic of discussion. as companies strive to personalize their marketing efforts to cater to individual preferences and behaviors, questions about privacy ...


Sovereign Cloud Solutions for a Secure Future

Sovereign Cloud Solutions for a Secure Future

Cyber Security & Privacy Cloud Computing
June 14, 2024 68 0

A sovereign cloud is a cloud computing environment designed to meet the specific data sovereignty requirements of an organization or government. This means data is stored in compliance with local laws and is protected from foreign...


Secrets management: The critical piece in your DevSecOps puzzle

Secrets management: The critical piece in your DevSecOps puzzle

Data Privacy Threat Intelligence Cyber Security & Privacy
June 10, 2024 18 0

Think of the secret ingredients that make your applications work – API keys, database passwords, certificates. These digital credentials unlock access to sensitive data and functionalities, but keeping them secure can be challengi...


Exploring the Five Stages of a Successful CTEM Program

Exploring the Five Stages of a Successful CTEM Program

Threat Intelligence Cyber Security & Privacy
May 27, 2024 47 0

  The Continuous Threat Exposure Management or CTEM is a five-stage approach to continuously expose an organization's networks, systems, and assets to simulated attacks to identify vulnerabilities and weaknesses. This allo...


Growing Market Of VAPT Services In India: Key Contributing Factors

Growing Market Of VAPT Services In India: Key Contributing Factors

IT Services Cyber Security & Privacy
May 22, 2024 140 0

The digital landscape of India is experiencing exponential growth, and with this expansion comes a heightened focus on cybersecurity. Vulnerability Assessment and Penetration Testing (VAPT) services are rapidly becoming an essenti...


PowerShell: Simplifying Task Automation and Cybersecurity on Windows

PowerShell: Simplifying Task Automation and Cybersecurity on Windows

Cyber Forensics Cyber Security & Privacy
May 22, 2024 54 0

  PowerShell is a powerful tool that helps automate tasks and manage configurations, especially on Windows systems. It's also useful for penetration testers and ethical hackers to automate various activities. In simple ...


© Copyright nasscom. All Rights Reserved.