Topics In Demand
Notification
New

No notification found.

Filter
Data Privacy
Cyber Advocacy - The Evolving Contours of a Critical Function

Cyber Advocacy - The Evolving Contours of a Critical Function

Cyber Forensics Data Privacy Cyber Security & Privacy
December 20, 2021 403 0

Introduction Cybersecurity is an inclusive concept; it not only has wide ramifications cutting across Societies, Government and Businesses, it also directly impacts human behavior - whether co-operative or malefic. The span, re...


What is Penetration Testing? A brief Guide

What is Penetration Testing? A brief Guide

Data Privacy IT Services
October 20, 2021 36 0

Penetration testing or pen testing is a technique that organizations use to unveil and test the security loopholes and vulnerabilities in their security protocols. Trained professionals or cybersecurity experts who simul...


Why just SSL won’t protect you and how you can fix it?

Why just SSL won’t protect you and how you can fix it?

Data Privacy
September 9, 2021 121 0

SSL Certificate has become a must-have thing for every website today for several reasons, like data encryption, green padlock icon to gain user trust, improved SEO, etc. However, the website owners aren’t aware of wha...


Best Practices of Database Performance Tuning which will Take you to the Next Level

Best Practices of Database Performance Tuning which will Take you to the Next Level

Big Data Analytics IT Services Data Privacy Data Science & AI Community
July 16, 2021 82 0

It is a big question among the DBAs as to how important database performance tuning is? As we know now, the business world essentially runs on various types of data. In order to ensure that the data is quickly and easily accessibl...


What to do if you have a data breach

What to do if you have a data breach

Data Privacy
June 14, 2021 51 0

In the wake of the recent OneLogin data breach, it becomes evident that no one is safe in the cyber world. All companies are susceptible to attacks and should be prepared to react in case of a sensitive data breach. Have you ever ...


5 Ways to Keep Your Organization Safe from Data Breaches

5 Ways to Keep Your Organization Safe from Data Breaches

Data Privacy
April 8, 2021 73 0

Data breaches have become so frequent now that it easily gets lost in our daily feed.  Almost every single day, we are witnessing a plethora of data being exposed and published over darknet forums. Nearly 36 billion records w...


Blog

Overcoming data security challenges in a remote working environment

Data Privacy
January 19, 2021 701 0

Overcoming data security challenges in a remote working environmentIn the previous article, (https://community.nasscom.in/communities/covid-19/remote-working-the-new-normal-how-to-enable-it-quickly.html), we briefly touched up on ...


Blog

Improving CSAT in A BPO Contact Center by Integrating Conversational AI with RPA

Data Privacy AI BPM
December 5, 2020 850 0

Imagine a banking BPO getting hundreds of loan applications each day from scores of countries that the bank services worldwide. If humans were to work on this unassisted, it would be inefficient, and error-prone leading to incorre...


Blog

Ransomware and Viruses: Top differences you should know

Data Privacy
October 9, 2020 2991 0

Ransomware and Viruses – both pose a significant threat to your security. They can infect your system, remove files, and cost you a whole lot of money.But, if they do the same thing, then what is the difference? What exactly are t...


Blog

Ransomware – A Painful Extortion

Data Privacy
May 19, 2020 1595 0

The word Ransom refers to a demand made by the abductors for the release of an imprisoned. In some cases, the criminal may not release the person even after getting the money.Similarly, in the cyber world, it’s not guaranteed that...


© Copyright nasscom. All Rights Reserved.