Topics In Demand
Notification
New

No notification found.

Filter
Threat Intelligence
What is Google Cloud Platform: All in One Guide to GCP

What is Google Cloud Platform: All in One Guide to GCP

Threat Intelligence Emerging Tech Cloud Computing
December 13, 2024 183 0

Google was launched in 1998. Since then, it has given birth to the most robust IT infrastructures. Google has a suite of public cloud computing tools and services which is known as GCP. It also includes Looker Studio, Google BigQu...


How OEMs can leverage SDVs to stay ahead of the curve

How OEMs can leverage SDVs to stay ahead of the curve

Analytics Function Data Privacy Threat Intelligence Smart Mobility Tech for Good Emerging Tech AI Industry Trends Engineering Research & Design
December 9, 2024 19 0

The USD 3.6 trillion global automotive industry is undergoing a transformative shift towards Software-Defined Vehicles (SDVs), signalling a new era where software takes precedence over hardware. This evolution demands massive inve...


How software-defined vehicles are revolutionising commercial vehicles —and why you should care

How software-defined vehicles are revolutionising commercial vehicles —and why you should care

Analytics Function Data Privacy Threat Intelligence AI Inside 5G Smart Mobility Tech for Good Emerging Tech AI Machine Learning Industry Trends Engineering Research & Design
November 25, 2024 1565 0

Software-defined vehicles (SDVs) are already creating ripples in the automotive industry, especially among passenger vehicles. But what about the commercial vehicle (CV) sector? For an industry fueled by tight margins and foc...


The future of smart manufacturing

The future of smart manufacturing

Project Management Threat Intelligence Digital Transformation Tech for Good Machine Learning Big Data Analytics Industry 4.0 Future of work Manufacturing
November 11, 2024 98 0

The manufacturing landscape has undergone a transformative shift over the past two decades, evolving from manual labour-intensive processes to highly automated and intelligent operations. Let us explore the progression of manufact...


Harnessing AI for a Smarter, Proactive Approach to Cybersecurity Incident Management

Harnessing AI for a Smarter, Proactive Approach to Cybersecurity Incident Management

Cyber Security & Privacy Threat Intelligence Data Science & AI Community Digital Transformation Emerging Tech IT Services AI
September 30, 2024 167 0

  In today's rapidly evolving digital landscape, cybersecurity incidents have become more sophisticated. Organizations across industries are witnessing increasingly complex and diverse cyberattacks, insider threats, and da...


AI-driven vulnerability scanning: A new era of cybersecurity

AI-driven vulnerability scanning: A new era of cybersecurity

Cyber Forensics Data Privacy Threat Intelligence AI Machine Learning Cyber Security & Privacy
September 17, 2024 78 0

In a world where cyber threats are evolving rapidly, the practice of vulnerability scanning is undergoing a transformative revolution. Static defences and reactive measures are no longer efficient to discover threats. Today cybers...


How to choose the right vulnerability scanner for your security needs

How to choose the right vulnerability scanner for your security needs

Threat Intelligence Digital Transformation AI Machine Learning IT Services Cyber Security & Privacy
September 9, 2024 19 0

Organizations find safeguarding their infrastructure and applications complex as the digital landscape becomes increasingly complicated. Unaddressed vulnerabilities can lead to devastating consequences, including data breaches, op...


Fortify Your DevOps: Mastering Vulnerability Management

Fortify Your DevOps: Mastering Vulnerability Management

Cyber Security & Privacy Cyber Forensics Data Privacy Digital Payment Safety Threat Intelligence DevOps
August 16, 2024 45 0

The widespread impact of the CrowdStrike outage has forced businesses to reevaluate their cybersecurity strategies. Luckily, the incident didn't breach any systems, but it revealed the fragility of even the most sophisticated secu...


Secrets management: The critical piece in your DevSecOps puzzle

Secrets management: The critical piece in your DevSecOps puzzle

Data Privacy Threat Intelligence Cyber Security & Privacy
June 10, 2024 18 0

Think of the secret ingredients that make your applications work – API keys, database passwords, certificates. These digital credentials unlock access to sensitive data and functionalities, but keeping them secure can be challengi...


Exploring the Five Stages of a Successful CTEM Program

Exploring the Five Stages of a Successful CTEM Program

Threat Intelligence Cyber Security & Privacy
May 27, 2024 48 0

  The Continuous Threat Exposure Management or CTEM is a five-stage approach to continuously expose an organization's networks, systems, and assets to simulated attacks to identify vulnerabilities and weaknesses. This allo...


© Copyright nasscom. All Rights Reserved.