HomeTechnology

Technology

Denodo

 

Credential Stuffing Attack

Overview Credential stuffing attacks exploit stolen usernames and passwords, from previous data breaches, to access online accounts. As data breaches...

AI-Powered Payment Manipulation: Adversarial Attack on Fraud Detection Algorithms

In the evolving landscape of financial technology (Fintech), artificial intelligence (AI) has emerged as a cornerstone for securing digital...

Advanced Persistent Threats: Defending Against Organized Crime and Nation-State Attackers

Scenario & Impact In today's hyperconnected business environment, sophisticated threat actors systematically probe corporate networks with unprecedented precision. These advanced...

Leveraging Agentic AI for Cybersecurity: Opportunities and Risks

Introduction: The Evolving Cyber Threat Landscape  The contemporary digital landscape faces a complex and high-volume wave of cyber threats, outpacing...

Securing India’s Cloud-First Future

India's cloud adoption is accelerating at an unprecedented pace, driven by digital transformation, generative AI advancements, and multi-cloud strategies....

The Evolving Landscape of Zero Trust: Where We Stand Today

In an era where cyber threats grow more sophisticated by the day, relying solely on traditional security frameworks is...
- Advertisement -

The Growing Threat of Phishing and Social Engineering Attack and How to Defend Against Them

Cybersecurity threats are not about viruses or hacking anymore; they are now about manipulating individuals. Social engineering is a...

The Future Factory: India’s Manufacturing Renaissance

As India sets the target of becoming a trillion-dollar economy, its manufacturing sector, a key driver of the national...

The Technological Metamorphosis of Manufacturing: Towards a Connected Future

With the rise of industry 4.0 or the fourth industrial revolution, the manufacturing sector is undergoing an unprecedented transformation....

Explore how AI is revolutionizing threat detection and response in banking, but also delve into the potential...

The digital evolution of banking has brought immense convenience, yet simultaneously amplified cyber security risks, positioning Artificial Intelligence (AI)...
 
 
error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch