Header Banner Header Banner
Topics In Demand
Notification
New

No notification found.

Filter
Threat Intelligence
AI-driven vulnerability scanning: A new era of cybersecurity

AI-driven vulnerability scanning: A new era of cybersecurity

Cyber Forensics Data Privacy Threat Intelligence AI Machine Learning Cyber Security & Privacy
September 17, 2024 152 0 Read Article

In a world where cyber threats are evolving rapidly, the practice of vulnerability scanning is undergoing a transformative revolution. Static defences and reactive measures are no longer efficient to discover threats. Today cybers...


How to choose the right vulnerability scanner for your security needs

How to choose the right vulnerability scanner for your security needs

Threat Intelligence Digital Transformation AI Machine Learning IT Services Cyber Security & Privacy
September 9, 2024 92 0 Read Article

Organizations find safeguarding their infrastructure and applications complex as the digital landscape becomes increasingly complicated. Unaddressed vulnerabilities can lead to devastating consequences, including data breaches, op...


Exploring the Five Stages of a Successful CTEM Program

Exploring the Five Stages of a Successful CTEM Program

Threat Intelligence Cyber Security & Privacy
May 27, 2024 71 0 Read Article

  The Continuous Threat Exposure Management or CTEM is a five-stage approach to continuously expose an organization's networks, systems, and assets to simulated attacks to identify vulnerabilities and weaknesses. This allo...


The Password Paradox: Choosing Unbreakable Passwords for You

The Password Paradox: Choosing Unbreakable Passwords for You

Threat Intelligence Data Privacy
May 7, 2024 76 0 Read Article

Choosing the right password is crucial for online security. Using a robust password considerably decreases the chance of unauthorized access to your accounts. It acts as a barrier against cyberattacks and protects your sensitive i...


Fortifying software supply chain security: Challenges & best practices

Fortifying software supply chain security: Challenges & best practices

Cloud Computing Data Privacy Threat Intelligence Data Privacy Cyber Security & Privacy
March 26, 2024 40 0 Read Article

The software supply chain, crucial in developing and distributing software, is increasingly targeted by cyber attackers. Vulnerabilities, malicious code injections, and compromised distribution channels pose significant risks, emp...


Cyber Grinch alert: Secure yourself this holiday season

Cyber Grinch alert: Secure yourself this holiday season

Digital Payment Safety Threat Intelligence Cyber Security & Privacy
December 12, 2023 85 0 Read Article

'Tis the season for festive joy and, unfortunately, a heightened risk of holiday cyber-attacks. As Christmas approaches, we all look forward to a well-deserved break from our computers, creating an open season for hackers. Surpris...


Navigating the Moral Crossroads: Ethical Challenges in AI Decision-Making

Navigating the Moral Crossroads: Ethical Challenges in AI Decision-Making

Threat Intelligence AI
December 8, 2023 63 0 Read Article

With AI and Algorithms in every aspect, the decisions made by machines are becoming increasingly intertwined with our daily lives. As we head towards technological advancements, it's crucial to shine a light on the ethical challen...


Addressing Ransomware in Critical Information Infrastructure: Ten Essential Questions and Actions

Addressing Ransomware in Critical Information Infrastructure: Ten Essential Questions and Actions

Analytics Cyber Security & Privacy Threat Intelligence
October 13, 2023 82 0 Read Article

Critical information infrastructure is facing an escalating and multifaceted threat from ransomware attacks. These attacks, once predominantly associated with data breaches and financial extortion, have evolved into a tool for dis...


The Power of Remote IT Service Delivery and Management

The Power of Remote IT Service Delivery and Management

Cyber Security & Privacy Threat Intelligence Future of work Application
August 21, 2023 120 0 Read Article

In today's fast-paced digital world, the demand for efficient and reliable IT services has reached unprecedented levels. With the advent of advanced technologies and the widespread adoption of remote work, organizations are contin...


Educating and empowering developers to build the DevSecOps culture

Educating and empowering developers to build the DevSecOps culture

Cyber Security & Privacy Data Privacy Threat Intelligence Data Privacy DevOps
August 18, 2023 52 0 Read Article

In our increasingly interconnected world, where data breaches and security threats dominate headlines, it is time for organizations to step up their security game to ensure threats and breaches are kept at bay. To tackle these cha...


© Copyright nasscom. All Rights Reserved.