Header Banner Header Banner
Topics In Demand
Notification
New

No notification found.

Filter
Data Privacy
Draft DPDP Rules Check-In: Do These Four Clauses Continue to Define the Key Day-One Friction Points?

Draft DPDP Rules Check-In: Do These Four Clauses Continue to Define the Key Day-One Friction Points?

Data Privacy Public Policy
July 30, 2025 152 0 Read Article

On Day One, the real operational friction is likely to turn on breach‑alert volume, parent‑consent workflows, clarity on SDF triggers, and penalty calibration—unless the final rules address the same. 1. Breach workflow: user al...


Model Context Protocols: The Global Standard for Agentic Communication or a New Security Loophole?

Model Context Protocols: The Global Standard for Agentic Communication or a New Security Loophole?

Cyber Security & Privacy Data Privacy Threat Intelligence Data Science & AI Community Digital Transformation AI nasscom insights Emerging Tech
July 30, 2025 107 1 Read Article

As Agentic AI continues to evolve, numerous protocols are emerging that enable autonomous communication and coordination. These protocols enable agents to independently discover, select and allocate resources without requiring hum...


Savills Research: Data Centre Market Watch | H1 2025

Savills Research: Data Centre Market Watch | H1 2025

Data Privacy
July 25, 2025 941 1 Read Article

Savills latest report, Data Centre Market Watch | H1 2025, features updates from India’s data centre market. Our latest report, Data Centre Market Watch | H1 2025, features updates from India’s data centre market. In H1 2025,...


Vector databases: Revolutionizing AI and search

Vector databases: Revolutionizing AI and search

Data Privacy AI
July 24, 2025 41 0 Read Article

Ever wonder how your favorite apps seem to get what you’re looking for, like suggesting the perfect song or product? That’s where vector databases come in. They’re a smart way to handle data, making searches and recommendations fa...


How AI Can Improves Data Protection For Your Business.

How AI Can Improves Data Protection For Your Business.

Data Privacy Data Science & AI Community AI
July 14, 2025 64 0 Read Article

In today’s digital world, data is one of the most valuable resources. Every day, businesses, governments, and individuals create, share, and store huge amounts of data. This includes customer records, financial details, health inf...


Unified Data Fabric

Unified Data Fabric

Data Privacy Cyber Security & Privacy
July 11, 2025 39 0 Read Article

What is Unified Data Fabric? A Unified Data Fabric is an architectural framework that connects, integrates, and governs data across hybrid and multi-cloud environments—regardless of where it resides or what form it ta...


The Sovereign AI Paradox: Building Autonomy Without Breaking the Business

The Sovereign AI Paradox: Building Autonomy Without Breaking the Business

Cyber Security & Privacy Data Privacy
July 10, 2025 47 0 Read Article

In a world where AI defines global competitiveness, data sovereignty has emerged as both a policy mandate and a corporate ambition. Nations are building digital fortresses, while enterprises are racing to align their AI strategy w...


Quantum Computing

Quantum Computing

Data Privacy Cyber Security & Privacy
July 7, 2025 67 0 Read Article

What is Quantum Computing? Quantum computing is a revolutionary computing paradigm that leverages the principles of quantum mechanics—specifically superposition, entanglement, and quantum interference—to perform computations fa...


Unified Data Fabric

Unified Data Fabric

Data Privacy Big Data Analytics
July 7, 2025 62 0 Read Article

What is Unified Data Fabric? A Unified Data Fabric is an architectural framework that connects, integrates, and governs data across hybrid and multi-cloud environments—regardless of where it resides or what form it ta...


Application Security Assessments: Moving Beyond the Checklist

Application Security Assessments: Moving Beyond the Checklist

Application Data Privacy
July 4, 2025 51 0 Read Article

Application security is under the spotlight as cyber threats grow in scale and complexity. With 25% of data breaches linked to insecure applications, protecting the apps is a must. Security testing and tool sprawl are becoming eve...


© Copyright nasscom. All Rights Reserved.