Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Blog

Nuts and Bolts of 5G Security: Technologies, Architectures, Use-cases, Standards & Policies

Cyber Security & Privacy
November 10, 2020 722 0

With recent 5G enabled flagship phone launches, everyone believes that we have moved one step closer to the wide adoption of this technology.  While the current 4G technology can handle voice, video stream, web browsing, and text ...


Blog

Security 2025: Future casting the impact of NCSS 2020

Cyber Security & Privacy
November 10, 2020 499 0

As India is on the way to becoming a USD 1 trillion digital economy, the Government of India is working towards updating its National Cyber Security Strategy 2020 (NCSS) in order to improve its position in cyberspace. While India ...


Blog

Vulnerability Assessment: Increasingly Becoming Top Priority for C-Suit in The New Normal

Cyber Security & Privacy
November 10, 2020 960 0

Conducting an assessment to look out for vulnerabilities existing within the networks, applications or infrastructure has always been an ideal approach to safeguard your organization against evolving and complex cyber threats. And...


Blog

Need For Security Testing of Mobile Apps

Cyber Security & Privacy Mobile & Web Development
October 28, 2020 1326 0

Bring-Your-Own-Device (BYOD) policy is hardly a novelty these days as enterprises now allow employees to access sensitive business data on their personal mobile devices. Hence, a large percentage of users utilize the same mobile d...


Blog

Cybersecurity in Post-COVID Environment: Time for C-Level Executives to Devise New Strategy

Cyber Security & Privacy
October 23, 2020 1044 0

As COVID-19 restrictions have started slackening, people are transitioning back to their offices and social calendar. Unfortunately, this shift is expected to introduce an increased threat of malicious activities. The risk is comp...


Blog

Awareness – Key To Protection Against Cyber Attacks

Cyber Security & Privacy
October 14, 2020 664 0

Are you aware that 99% of cyber-attacks require human interaction?Nearly, all cybersecurity incidents start with the exploitation of the human tendency to make errors. Phishing and Social Engineering are the most common methods us...


Blog

National Cyber Security Awareness Month (NCSAM)

Cyber Security & Privacy
October 13, 2020 1198 0

October is celebrated as National Cyber Security Awareness Month (NCSAM) globally.The Internet is today’s backbone for all kind of online services, and it has given rise to various features such as Social Media, Online Shopping, D...


Blog

IoT Security Takes The Centerstage In The Post-COVID-19 World

Cyber Security & Privacy
October 8, 2020 2038 0

Security is a ‘state of mind’ and not an end state. It has been a popular philosophical thought, but what it eludes is the fact of investment towards security. IoT has exploded with the onset of new smart tech gadgets. Though busi...


In the Era of phishing and its prevention

In the Era of phishing and its prevention

Cyber Security & Privacy
October 7, 2020 1265 0

In The Era of Phishing and Its PreventionDuring this crisis “coronavirus pandemic” give those criminals a big opportunity to attract victims into taking their phishing lure. Phishing attacks are not new to the threat landscape, th...


Mobile Applications – Intensifying Risks to Data Security & Privacy

Mobile Applications – Intensifying Risks to Data Security & Privacy

Cyber Security & Privacy Data Privacy Function
October 6, 2020 841 0

Mobile applications are now surfacing as a new feeble link when it comes to user’s information security and privacy. Threat actors are utilizing advanced techniques to evade detection while deploying malicious applications...


© Copyright nasscom. All Rights Reserved.