Skip to content
Friday, April 17, 2026
CISO Forum logo Final
  • facebook
  • instagram
  • twitter
  • youtube
  • Insights
  • View Points
  • Leadership Corner
  • Case Studies
  • News
  • Resources
    • Magazine
  • Contact
  • Events
    • The CISO Forum

Tag: API

  • Home
  • API
Scaling AI safely: Why India needs an AI-first approach to security
  • Latest
  • View Points

Scaling AI safely: Why India needs an AI-first approach to security

  • CISO Forum Bureau
  • March 27, 2026
  • 0

India’s artificial intelligence journey is entering a decisive new phase. What was once experimentation is quickly becoming execution at scale. AI is now deeply integrated […]

Check Point Researchers Expose Critical Claude Code Flaws  
  • Press Release

Check Point Researchers Expose Critical Claude Code Flaws  

  • CISO Forum Bureau
  • March 2, 2026
  • 0

By Aviv Donenfeld and Oded Vanunu As organizations rapidly adopt agentic AI development tools into enterprise workflows, the trust boundaries between configuration and execution are […]

Cloud Security in 2025: Speed, AI, and the Battle Against Complexity
  • Insights
  • Latest

Cloud Security in 2025: Speed, AI, and the Battle Against Complexity

  • Jagrati Rakheja
  • January 8, 2026
  • 0

The State of Cloud Security Report 2025 from Palo Alto Networks reveals a sobering reality: cyberattacks have nearly tripled in just one year, surging from […]

Karnataka Bank Innovates with IBM to Build Future-Ready API Platform for Faster Service Delivery to Customers
  • Press Release

Karnataka Bank Innovates with IBM to Build Future-Ready API Platform for Faster Service Delivery to Customers

  • CISO Forum Bureau
  • December 3, 2025
  • 0

Karnataka Bank Limited, one of India’s leading ‘A’ Class Scheduled Commercial Banks, collaborated with IBM to modernize its digital banking infrastructure using IBM Cloud Pak […]

Unified Intelligence: Redefining External Threat Management in the AI Era
  • Interview
  • Latest

Unified Intelligence: Redefining External Threat Management in the AI Era

  • Jagrati Rakheja
  • November 12, 2025
  • 0

As cyber threats migrate beyond traditional perimeters into third-party clouds, social platforms, and open APIs, enterprises face a critical challenge: visibility. Setu Parimi, Co-Founder & […]

From Malware to Malicious Containers: The Emerging Threats in Software Supply Chains
  • Press Release

From Malware to Malicious Containers: The Emerging Threats in Software Supply Chains

  • CISO Forum
  • October 27, 2025
  • 0

Cyberattacks are no longer limited to hackers planting viruses or sending phishing emails. Today, attackers are targeting the very foundation of how software is built […]

Rebuilding Trust in Cybersecurity AI: Smarter, Safer Protection for Mobile Apps
  • Insights
  • Latest

Rebuilding Trust in Cybersecurity AI: Smarter, Safer Protection for Mobile Apps

  • CISO Forum
  • September 30, 2025
  • 0

The digital economy today runs on mobile applications. Banks are opening accounts on Mobile apps before branches, fintechs are redefining payments with a tap, and […]

Unity Small Finance Bank Taps IBM to Fast-Track Customer Experience Innovation with Streamlined Application Management
  • Press Release

Unity Small Finance Bank Taps IBM to Fast-Track Customer Experience Innovation with Streamlined Application Management

  • CISO Forum Bureau
  • September 26, 2025
  • 0

Unity Small Finance Bank (Unity Bank), a new-age bank, has collaborated with IBM to centralize and secure its growing Application Programming Interface (API) ecosystem, using IBM […]

India’s Expanding Digital Economy Faces an AI-Powered Ransomware Storm
  • Interview
  • Latest

India’s Expanding Digital Economy Faces an AI-Powered Ransomware Storm

  • Jagrati Rakheja
  • September 24, 2025
  • 0

India’s digital economy is expanding at a staggering pace—cloud adoption, fintech innovation, and mobile-first commerce are reshaping the country’s enterprise landscape. Yet with opportunity comes […]

Beyond Compliance: How Indian Enterprises Are Turning Cybersecurity Into a Competitive Weapon
  • Interview
  • Latest

Beyond Compliance: How Indian Enterprises Are Turning Cybersecurity Into a Competitive Weapon

  • Jagrati Rakheja
  • September 22, 2025
  • 0

Cybersecurity has evolved from a compliance cost to a competitive differentiator in India’s rapidly digitizing economy, according to Anjali Amar, Vice President & Country Head, […]

View Points

View All
  • Latest
  • View Points

Rethinking Cybersecurity: The Shift to Identity-Centric Security

  • CISO Forum
  • April 9, 2026
  • 0
  • View Points

Cyber Resilience in Times of Crisis: How Enterprises Can Stay Secure and Operational

  • CISO Forum Bureau
  • April 8, 2026
  • 0
  • Latest
  • View Points

Backups Alone Can’t Save You: The Urgent Need for Cyber Resilience

  • CISO Forum Bureau
  • April 7, 2026
  • 0

Publishing Industry Under Attack: Global AI Bot Activity Surges by 300%, Akamai Report Finds

  • CISO Forum Bureau
  • April 15, 2026
  • 0

Kaspersky expands Cyber Investigation Centre to KidZania Delhi NCR, building on successful Mumbai launch

  • CISO Forum Bureau
  • April 15, 2026
  • 0
password

Your office badge and your password are now the same thing, and that should terrify hackers

  • Jagrati Rakheja
  • April 14, 2026
  • 0
Cyberattacks

Palo Alto Networks Unit 42 Identifies Security Risks in Google Cloud Vertex AI Agents

  • CISO Forum Bureau
  • April 13, 2026
  • 0

Neelam Dhawan Appointed as Chairperson of Data Security Council of India (DSCI) to Strengthen Cybersecurity Leadership

  • CISO Forum
  • April 10, 2026
  • 0
Teciem Appoints Preeti Singh as Chief Information Security Officer to Strengthen Cybersecurity Leadership

Teciem Appoints Preeti Singh as Chief Information Security Officer to Strengthen Cybersecurity Leadership

  • CISO Forum
  • April 10, 2026
  • 0

About CISO Forum

At CISO Forum, we are dedicated to fostering a vibrant community of cybersecurity leaders, innovators, and experts. Our mission is to empower these professionals with knowledge, resources, and connections to navigate the complex and ever-evolving landscape of cybersecurity.

Copyright © 2026