Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
8 Benefits Of Shifting To Cloud Security Providers

8 Benefits Of Shifting To Cloud Security Providers

Cyber Security & Privacy Cloud Computing
May 21, 2024 15 0

As cloud adoption continues to accelerate, organizations are struggling with the complexities of securing their cloud environments effectively. Traditional security measures tailored for on-premises infrastructures often fall shor...


Secure Coding Techniques: Building Robust and Resilient Software

Secure Coding Techniques: Building Robust and Resilient Software

Cyber Security & Privacy
May 17, 2024 17 0

Article Contents: Input Validation Parameterized Queries Authentication and Authorization Session Management Error Handling Secure Configuration Regular Updates and Patch Management Here’s a brief overview o...


Mission-critical embedded systems: High reliability for improved security (Part-2)

Mission-critical embedded systems: High reliability for improved security (Part-2)

Cyber Security & Privacy
May 14, 2024 15 0

  As we saw in part-1 of this article, high availability of mission critical systems translates to improved security and redundant boot mechanisms ensures high availability of embedded systems. Redundant boot m...


AISecOps: The future of security operations is intelligent

AISecOps: The future of security operations is intelligent

Cyber Security & Privacy Data Privacy Data Privacy DevOps AI
May 14, 2024 36 0

The digital landscape is constantly evolving, and so are the threats we face. Traditional security operations, reliant on manual analysis and limited resources, need help to keep up with the ever-growing volume and sophistication ...


IoT Penetration Testing: Securing Connected Devices

IoT Penetration Testing: Securing Connected Devices

Cyber Forensics IOT Cyber Security & Privacy
May 10, 2024 47 0

The Internet of Things (IoT) has transformed our lives by interconnecting an ever-growing number of devices that communicate and exchange data via the internet. These devices range from everyday household items like smart thermost...


Zero Trust Security: A Cornerstone Of Modern Cybersecurity

Zero Trust Security: A Cornerstone Of Modern Cybersecurity

Data Privacy Digital Transformation Cyber Security & Privacy
May 7, 2024 49 0

Author by: Amit Kharkade, Senior Technology Specialist - Xoriant In today's digital era, where AI is prevalent and businesses are rapidly embracing digital transformations, ensuring robust security measures is paramou...


The Rising Threat of Deepfakes in Cyber Security and Privacy

The Rising Threat of Deepfakes in Cyber Security and Privacy

Data Privacy Cyber Security & Privacy
May 3, 2024 670 0

Introduction In the digital age, the line between reality and artificiality is becoming increasingly blurred. One of the most significant contributors to this phenomenon is the advent of deepfakes. These AI-generated synthetic ...


Strengthening Web Security: A Multi-Layered Approach to CSRF Protection

Strengthening Web Security: A Multi-Layered Approach to CSRF Protection

Cyber Security & Privacy
May 2, 2024 8 0

Background Cross-Site Request Forgery (CSRF), also known as “Sea Surf,” Session Riding, Hostile Linking, or one-click attacks, is a prevalent web security vulnerability that exploits users' trust in websites to execute unauthor...


GenAI Security

GenAI Security

Cyber Security & Privacy AI Inside AI
April 23, 2024 121 0

With the advent of GenAi, the security posture of enterprises has changed a lot and there are few new areas that needs to be looked at holistically. The enormous amount of data fed to AI systems have exponentially increased one of...


Securing your Organization from Insider Threats with Zero Trust

Securing your Organization from Insider Threats with Zero Trust

Cloud Computing Cyber Security & Privacy
April 19, 2024 50 0

Recent studies reveal a significant surge in insider threats, underscoring the critical need for a paradigm shift in cybersecurity strategies. According to the latest cybersecurity reports, insider threats constitute a substantial...


© Copyright nasscom. All Rights Reserved.