Sachchidanand Muchandi has been promoted to Executive Director & Group CISO at JM Financial Ltd. With nearly three decades of experience in cybersecurity strategy, regulatory […]
Your office badge and your password are now the same thing, and that should terrify hackers
The HID 2026 State of Security and Identity Report surveyed over 1,500 professionals and found…
Your Company Thinks It’s Safe From AI Security Threats. A New Report Says You’re Dead Wrong.
Organizations are rushing to adopt AI at scale — but a sweeping new global study…
Your APIs are lying to you: 1 in 3 security failures go undetected
KushoAI’s State of API Security 2026 report, drawn from 1.4 million real test executions across…
Guarding the digital frontier: Inside the mind of a cybersecurity visionary
Veteran CISO Agnelo Dsouza shares his cybersecurity journey from engineer to security leader. He emphasizes balancing technical skill development with technology investment, maintaining work-life equilibrium, […]
Implementing Zero Trust: Practical Strategies for CISOs
With cyber threats evolving rapidly and organizations adopting cloud-first strategies, traditional perimeter-based security is no longer sufficient. From the days of ‘Deny All’ on firewall […]
Exposed and Exploited: The Growing Danger of Edge Device Attacks in India’s Critical Systems
The Rising Threat of Exploited Edge Devices in Cyber SecurityAs India rapidly digitizes across sectors, edge devices such as routers, firewalls, and VPNs are emergingas […]
Cyber resilience in the age of intelligent risk
As organizations accelerate their digital transformation agendas amid rising geopolitical tensions and evolving regulatory demands, achieving true cyber resilience has emerged as one of their […]
Reckoning with OT Security
With India’s industrial sector digitizing at breakneck speed, manufacturing and industrial CISOs face new frontier—securing operational technology (OT)—systems that control everything from power grids and […]
Fake Kling AI Ads Spread RAT Malware in Sophisticated Facebook Campaign, Warns Check Point
As generative AI continues to capture global attention, threat actors are quick to exploit AI’s capabilities and popularity. From deepfake scams to impersonation attacks, the rising trust […]
Ransomware Landscape Shifts Amid Law Enforcement Pressure, Recovery Capabilities Improve
Ransomware landscape transformed in 2024 as law enforcement dismantled major groups while organizations improved recovery capabilities, prompting criminals to adapt with new tactics and alliances. […]
Seqrite Identifies 650+ Cyber Incidents Linked to Geopolitical Tensions Surrounding ‘Operation Sindoor’
Quick Heal Technologies Limited, a global cybersecurity solutions provider, through its Seqrite Labs, India’s largest malware analysis facility, has revealed some critical details about coordinated cyberattacks exploiting […]
Threat Landscape Evolving with Operational Disruption and Rapid Attacks
A Unit 42 report reveals cybersecurity threats now focus on operational disruption, with attackers leveraging automation to exfiltrate data within one hour and launching simultaneous […]
