Topics In Demand
Notification
New

No notification found.

Filter
Cyber Security & Privacy
The Metaverse & Its Three Broad Components

The Metaverse & Its Three Broad Components

In the Spotlight Strategic Innovation Group Emerging Tech nasscom insights Cyber Security & Privacy
June 15, 2022 318 0

  We have been talking Metaverse more frequently now, than we were even 6 months back. This is true not only for the tech community but also includes a large section of the populace who have identified the value this colle...


The rise of Ransomware-as-a-service (RaaS)

The rise of Ransomware-as-a-service (RaaS)

Cyber Security & Privacy Data Privacy Analytics
June 10, 2022 244 2

In 2022, ransomware may undergo an Industrial Revolution of its own… The appearance of Software-as-a-Service (SaaS) organizations at the turn of the century has led, just over twenty years later, to an IT market where start-ups...


Digital dependency and the public need for digital trust

Digital dependency and the public need for digital trust

Data Privacy Digital Transformation Cyber Security & Privacy
June 6, 2022 195 1

In our increasingly connected world, newfound risks including misinformation, digital deception and a blurring of the lines between personal and digital safety are now threatening societal trust in digital systems and technologies...


 Is the enterprise security paradox a problem you can’t solve?

Is the enterprise security paradox a problem you can’t solve?

Cyber Security & Privacy
June 6, 2022 167 0

The traditional application of IT across enterprises is gradually dissolving. The Bring Your Own Device (BYOD) and Work from Home trends have widened the corporate network while transforming the way organizations function today...


Read Team and Blue Team of Cybersecurity: Why You Should Adopt It

Read Team and Blue Team of Cybersecurity: Why You Should Adopt It

Cyber Security & Privacy
June 1, 2022 355 1

The digital adoption has created widespread advantages of business processes and growth. Modern technological solutions based on digital platform such as Artificial Intelligence (AI), Machine Learning (ML), Internet of Things (IoT...


Information resilience in the organization with Best Practice Standards

Information resilience in the organization with Best Practice Standards

Cyber Security & Privacy Data Privacy Cloud Computing
May 31, 2022 52 1

Protect your information, people, and reputation. Explore the threat landscape, from information security and cyber risk to privacy and security awareness. Build confidence in your information resilience by embedding ISO Standards...


MOBILE FORENSICS TOOLS AND TECHNIQUES

MOBILE FORENSICS TOOLS AND TECHNIQUES

Cyber Forensics Cyber Security & Privacy
May 27, 2022 2382 1

Data acquisition is that the method of gathering information from mobile devices and their associated media. This method reduces the possibilities of information loss thanks to injury or battery depletion throughout storage and tr...


Managing healthcare cybersecurity in 2022 pt.1

Managing healthcare cybersecurity in 2022 pt.1

HealthTech and Life Sciences Cyber Security & Privacy
May 25, 2022 293 1

With significant data breaches hitting the headlines each year, healthcare cybersecurity is a major and expanding area for investment. Some experts predict the market will grow by almost 20% over the next five years, and it’s not ...


Understanding Client Credentials Flow in OAuth 2.0

Understanding Client Credentials Flow in OAuth 2.0

Cyber Security & Privacy
May 12, 2022 325 0

Client credentials flow in OAuth 2.0 is generally used for authenticating the service rather than the user. This grant_flow is used for machine-to-machine communication. In this grant flow, the cli...


BE CYBERSAFE - FIGHT SQL INJECTION

BE CYBERSAFE - FIGHT SQL INJECTION

Cyber Security & Privacy
May 10, 2022 294 0

Web based attack - SQL Injection (SQLi) SQL Injection (SQLi) is a type of injection attack that allows malicious SQL commands to be executed. These commands are used to control a database server that is connected to a web appli...


© Copyright nasscom. All Rights Reserved.