Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
Strengthening Web Security: A Multi-Layered Approach to CSRF Protection

Strengthening Web Security: A Multi-Layered Approach to CSRF Protection

Cyber Security & Privacy
April 18, 2024 112 0

Background Cross-Site Request Forgery (CSRF), also known as “Sea Surf,” Session Riding, Hostile Linking, or one-click attacks, is a prevalent web security vulnerability that exploits users' trust in websites to execute unauthor...


Top 9 Security & Risk Trends For Critical Information Infrastructure In India

Top 9 Security & Risk Trends For Critical Information Infrastructure In India

Cyber Forensics Data Privacy IT Services Cyber Security & Privacy
April 17, 2024 29 1

As India undergoes a transformative digital revolution across critical sectors like energy, finance, telecommunications, and transportation, the landscape of its information infrastructure has evolved dramatically. This evolution,...


Unraveling the Complexity of Cloud Security: What Should Enterprises Expect?

Unraveling the Complexity of Cloud Security: What Should Enterprises Expect?

Cyber Security & Privacy Cloud Computing
April 16, 2024 49 0

Author by: Amit Kharkade, Senior Technology Specialist - Xoriant Gartner projects that by 2025, an overwhelming 95% of new digital workloads are poised for cloud deployment. However, this shift doesn't imply a blind l...


Safeguarding Consumer IoT Data: Trust and Privacy

Safeguarding Consumer IoT Data: Trust and Privacy

Cyber Security & Privacy IOT
April 16, 2024 14 1

The expanding world of IoT devices and data security In the ever-expanding realm of technology and interconnected smart devices, the Internet of Things (IoT) is advancing at a rapid pace. According to Markets and Market...


Are Suppliers Handling Your Data Responsibly?

Are Suppliers Handling Your Data Responsibly?

Cyber Security & Privacy IT Services
April 16, 2024 20 1

Mitigating third-party vulnerability Decades ago, it was far simpler for an organization to identify the perimeter of its digital operations and put measures in place to prevent cyberattacks. The complexity and interconnecti...


Trust and Effective Management of Data and Privacy

Trust and Effective Management of Data and Privacy

Cyber Security & Privacy Data Privacy
April 16, 2024 10 1

Our increasingly connected society presents a potential pathway to a smarter and more sustainable world, with improved services more readily available to all. An enabler to unlocking this potential for individuals, organizations, ...


Understanding XDR

Understanding XDR

IT Services Cyber Security & Privacy
April 11, 2024 59 0

The security landscape is constantly evolving. As attackers develop new tactics, security professionals are trying to keep pace. Traditional security tools often struggle to provide a comprehensive view of threats, leaving enterpr...


AI: Reshaping the Tech Security Landscape

AI: Reshaping the Tech Security Landscape

Data Science & AI Community Cyber Security & Privacy
April 9, 2024 99 0

  The tech security landscape is undergoing a dramatic transformation fuelled by Artificial Intelligence (AI). While AI offers incredible potential to protect data and systems, it also introduces new complexities. AI i...


Exploring 3 Key Trends Shaping the Evolution of Security Operations Centers

Exploring 3 Key Trends Shaping the Evolution of Security Operations Centers

Application Data Privacy Cyber Security & Privacy
April 8, 2024 53 0

Author by: Amit Kharkade, Senior Technology Specialist - Xoriant The emergence of transformative technologies such as generative AI, the Internet of Things (IoT), and machine learning (ML) has revolutionized operational pa...


New Era of PHP Vulnerabilities: How Scanners Adapt to the Evolving Threat Landscape

New Era of PHP Vulnerabilities: How Scanners Adapt to the Evolving Threat Landscape

Cyber Security & Privacy
April 5, 2024 49 0

The world of web application security is a constant arms race. Developers strive to build secure applications, while attackers continuously discover new vulnerabilities to exploit. In the realm of PHP, a widely used language for w...


© Copyright nasscom. All Rights Reserved.