Topics In Demand
Notification
New

No notification found.

Filter
Threat Intelligence
The future of smart manufacturing

The future of smart manufacturing

Project Management Threat Intelligence Digital Transformation Tech for Good Machine Learning Big Data Analytics Industry 4.0 Future of work Manufacturing
November 11, 2024 77 0

The manufacturing landscape has undergone a transformative shift over the past two decades, evolving from manual labour-intensive processes to highly automated and intelligent operations. Let us explore the progression of manufact...


Harnessing AI for a Smarter, Proactive Approach to Cybersecurity Incident Management

Harnessing AI for a Smarter, Proactive Approach to Cybersecurity Incident Management

Cyber Security & Privacy Threat Intelligence Data Science & AI Community Digital Transformation Emerging Tech IT Services AI
September 30, 2024 160 0

  In today's rapidly evolving digital landscape, cybersecurity incidents have become more sophisticated. Organizations across industries are witnessing increasingly complex and diverse cyberattacks, insider threats, and da...


AI-driven vulnerability scanning: A new era of cybersecurity

AI-driven vulnerability scanning: A new era of cybersecurity

Cyber Forensics Data Privacy Threat Intelligence AI Machine Learning Cyber Security & Privacy
September 17, 2024 71 0

In a world where cyber threats are evolving rapidly, the practice of vulnerability scanning is undergoing a transformative revolution. Static defences and reactive measures are no longer efficient to discover threats. Today cybers...


How to choose the right vulnerability scanner for your security needs

How to choose the right vulnerability scanner for your security needs

Threat Intelligence Digital Transformation AI Machine Learning IT Services Cyber Security & Privacy
September 9, 2024 15 0

Organizations find safeguarding their infrastructure and applications complex as the digital landscape becomes increasingly complicated. Unaddressed vulnerabilities can lead to devastating consequences, including data breaches, op...


Fortify Your DevOps: Mastering Vulnerability Management

Fortify Your DevOps: Mastering Vulnerability Management

Cyber Security & Privacy Cyber Forensics Data Privacy Digital Payment Safety Threat Intelligence DevOps
August 16, 2024 42 0

The widespread impact of the CrowdStrike outage has forced businesses to reevaluate their cybersecurity strategies. Luckily, the incident didn't breach any systems, but it revealed the fragility of even the most sophisticated secu...


Secrets management: The critical piece in your DevSecOps puzzle

Secrets management: The critical piece in your DevSecOps puzzle

Data Privacy Threat Intelligence Cyber Security & Privacy
June 10, 2024 18 0

Think of the secret ingredients that make your applications work – API keys, database passwords, certificates. These digital credentials unlock access to sensitive data and functionalities, but keeping them secure can be challengi...


Exploring the Five Stages of a Successful CTEM Program

Exploring the Five Stages of a Successful CTEM Program

Threat Intelligence Cyber Security & Privacy
May 27, 2024 47 0

  The Continuous Threat Exposure Management or CTEM is a five-stage approach to continuously expose an organization's networks, systems, and assets to simulated attacks to identify vulnerabilities and weaknesses. This allo...


The Password Paradox: Choosing Unbreakable Passwords for You

The Password Paradox: Choosing Unbreakable Passwords for You

Threat Intelligence Data Privacy
May 7, 2024 10 0

Choosing the right password is crucial for online security. Using a robust password considerably decreases the chance of unauthorized access to your accounts. It acts as a barrier against cyberattacks and protects your sensitive i...


Fortifying software supply chain security: Challenges & best practices

Fortifying software supply chain security: Challenges & best practices

Cloud Computing Data Privacy Threat Intelligence Data Privacy Cyber Security & Privacy
March 26, 2024 13 0

The software supply chain, crucial in developing and distributing software, is increasingly targeted by cyber attackers. Vulnerabilities, malicious code injections, and compromised distribution channels pose significant risks, emp...


Cyber Grinch alert: Secure yourself this holiday season

Cyber Grinch alert: Secure yourself this holiday season

Digital Payment Safety Threat Intelligence Cyber Security & Privacy
December 12, 2023 24 0

'Tis the season for festive joy and, unfortunately, a heightened risk of holiday cyber-attacks. As Christmas approaches, we all look forward to a well-deserved break from our computers, creating an open season for hackers. Surpris...


© Copyright nasscom. All Rights Reserved.