Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Blog

Tokenization vs. Encryption: How To Keep Your Data Secure

Cyber Security & Privacy Blockchain
December 31, 2020 1214 0

It has been more than a decade since we first heard the expression “Data is the new Oil”. As enticing as it sounded back then, data has managed to fuel up economies across major markets today. Building customer loyalty has taken a...


Blog

Cybersecurity Preparedness – Lessons We Learnt In 2020

Cyber Security & Privacy
December 30, 2020 1472 0

To call 2020 a year filled with unprecedented challenges would not be an overstatement. Right from the eruption of COVID-19 pandemic to a comprehensive list of disruptive cyber-attacks, 2020 has engendered enormous concerns to ent...


Blog

INCIDENTS OF BITCOIN & CRYPTOCURRENCY HACKING

Cyber Security & Privacy Blockchain
December 11, 2020 611 0

Throughout this era, we’ve determined quite 100 major hacks of crypto exchanges and alternative cryptocurrency-related services. Very often, the small print of the hack stays unclears. It’s straightforward to be told WHO was...


Blog

LWC: Securing IoT Data and Communication

Cyber Security & Privacy
December 8, 2020 108 0

Rapid advancement in highly constrained devices is making a great impact on our daily lives. From smartwatches to autonomous cars, everything is connected and becoming intelligent day by day. The Internet of Things is contributing...


Blog

Why do you need an IT Security Audit for your Business?

Cyber Security & Privacy
December 7, 2020 458 0

If you’re an organization looking to achieve its security and compliance goals, you will probably be in need of an IT security audit. However, why do you need a security audit?A detailed IT security audit provides you the opportun...


Blog

E2E: Key for the digital society and economy

Cyber Security & Privacy
December 4, 2020 129 0

Encryption is an important part of modern digital society. With the rapid transformation into the digital ecosystem, the threat to digital data increases day by day due to smart black hat hackers. Hence, strong encryption algorith...


Blog

Top 10 of 2020: Vulnerabilities and Attacking Techniques

Cyber Security & Privacy
November 26, 2020 1334 0

The risk and severity of cyber-attacks have clearly grown over the last 5-6 months. In the Covid19 situation, dependence on digital platforms, applications, and infrastructure underscores the need for efficient cybersecurity defen...


Blog

Work 2020-25: Remote, Dynamic & Modular

Cyber Security & Privacy
November 20, 2020 108 0

The year 2020 has changed our interaction with our workplace – some of the organizations have announced a long-term plan for working in a distributed environment. Everyone around us can relate 3 terms – Remote, Dynamic, and Modula...


Blog

Why SASE – Unified security juxtaposed with core networking capabilities

Cyber Security & Privacy
November 18, 2020 110 0

Secure Access Service Edge (SASE) is a relatively new term that was coined by Gartner in 2019, with the objective of providing low latency access to the employees, cloud services, and devices. Gartner, in its strategic paper, defi...


© Copyright nasscom. All Rights Reserved.