{"id":3118,"date":"2025-10-23T07:25:06","date_gmt":"2025-10-23T07:25:06","guid":{"rendered":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/?p=3118"},"modified":"2026-02-26T06:49:15","modified_gmt":"2026-02-26T06:49:15","slug":"invited-talk-cyber-security-trends","status":"publish","type":"post","link":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/invited-talk-cyber-security-trends\/","title":{"rendered":"Invited Talk: Cyber Security Trends"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3118\" class=\"elementor elementor-3118\">\n\t\t\t\t<div class=\"elementor-element elementor-element-837e6c3 e-grid e-con-boxed e-con e-parent\" data-id=\"837e6c3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89c15c5 elementor-widget elementor-widget-text-editor\" data-id=\"89c15c5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On September 12, 2024, the Department of<br \/>Computer Applications at Assam Don Bosco University organized an invited talk titled \u201cCyber Security Trends\u201d presented by Mr. Subhasmit Malakar from Trusnetix Technologies. The session aimed to provide students of Department of Computer Applications with insights into the evolving landscape of cybersecurity, highlighting current trends, challenges, and best practices in the field. Mr. Subhasmit discussed about the latest trends in cybersecurity and their implications for<br \/>businesses and individuals. He also inspired students to consider careers in cybersecurity and related fields.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On September 12, 2024, the Department ofComputer Applications at Assam Don Bosco University organized an invited talk titled \u201cCyber Security Trends\u201d presented by Mr. Subhasmit Malakar from Trusnetix Technologies. The session aimed to provide students of Department of Computer Applications with insights into the evolving landscape of cybersecurity, highlighting current trends, challenges, and best practices [&hellip;]<\/p>\n","protected":false},"author":56,"featured_media":3119,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[14,12],"tags":[],"class_list":["post-3118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lectures","category-seminars"],"uagb_featured_image_src":{"full":["https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-content\/uploads\/sites\/11\/2025\/10\/ca6.png",356,301,false],"thumbnail":["https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-content\/uploads\/sites\/11\/2025\/10\/ca6-150x150.png",150,150,true],"medium":["https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-content\/uploads\/sites\/11\/2025\/10\/ca6-300x254.png",300,254,true],"medium_large":["https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-content\/uploads\/sites\/11\/2025\/10\/ca6.png",356,301,false],"large":["https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-content\/uploads\/sites\/11\/2025\/10\/ca6.png",356,301,false],"1536x1536":["https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-content\/uploads\/sites\/11\/2025\/10\/ca6.png",356,301,false],"2048x2048":["https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-content\/uploads\/sites\/11\/2025\/10\/ca6.png",356,301,false]},"uagb_author_info":{"display_name":"hodca","author_link":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/author\/hodca\/"},"uagb_comment_info":0,"uagb_excerpt":"On September 12, 2024, the Department ofComputer Applications at Assam Don Bosco University organized an invited talk titled \u201cCyber Security Trends\u201d presented by Mr. Subhasmit Malakar from Trusnetix Technologies. The session aimed to provide students of Department of Computer Applications with insights into the evolving landscape of cybersecurity, highlighting current trends, challenges, and best practices&hellip;","_links":{"self":[{"href":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-json\/wp\/v2\/posts\/3118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-json\/wp\/v2\/comments?post=3118"}],"version-history":[{"count":7,"href":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-json\/wp\/v2\/posts\/3118\/revisions"}],"predecessor-version":[{"id":3126,"href":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-json\/wp\/v2\/posts\/3118\/revisions\/3126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-json\/wp\/v2\/media\/3119"}],"wp:attachment":[{"href":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-json\/wp\/v2\/media?parent=3118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-json\/wp\/v2\/categories?post=3118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.dbuniversity.ac.in\/department-of-computer-applications\/wp-json\/wp\/v2\/tags?post=3118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}