Why Disconnected Security Tools Are Failing—And What Indian CISOs Must Do in 2026

In an era where cybersecurity threats are evolving at unprecedented speed, traditional defense mechanisms are proving inadequate against increasingly sophisticated attacks. As organizations grapple with AI-powered phishing, multi-layered ransomware, and expanding cloud vulnerabilities, the question is no longer whether companies will face a cyberattack, but when—and how prepared they’ll be to respond.

Parag Khurana
Country Manager
Barracuda, India

In a conversation with CISO Forum, Parag Khurana, Country Manager for Barracuda Networks India, brings critical insights into the shifting cybersecurity landscape of 2026. From the limitations of fragmented security tools to the rise of double-extortion ransomware tactics, Khurana addresses the most pressing challenges facing Indian enterprises today. In this conversation, he explores why integrated platforms are replacing siloed solutions, how AI is transforming both attack vectors and defense strategies, and why immutable storage has become non-negotiable for ransomware recovery and regulatory compliance under India’s Digital Personal Data Protection Act.

CISO Forum: Why are security tools alone no longer enough, and what must companies and leaders do to elevate cybersecurity as a board-level business strategy in 2026?

Parag Khurana: Security tools remain essential, but they are often disconnected, creating gaps in protection and visibility – gaps that attackers are quick to target and exploit.

To protect an ever-expanding attack surface, organisations need integrated security platforms. These platforms offer a powerful additional advantage: they provide clear, unequivocal reporting on the full spectrum of threats the company faces in real time, how these threats translate into risk, the potential business impact of this risk, and how the security investment is paying dividends. This level of insight is vital for elevating cybersecurity to the board as a business issue.

CISO Forum: How is AI enabling hyper-personalized phishing and social engineering, and why are traditional rule-based defences increasingly ineffective?

Parag Khurana: Traditional rule-based defences rely on static indicators such as known malicious domains, keyword lists, and sender reputation. This worked when phishing scams were poorly written emails with obvious deception, but modern threats are becoming increasingly sophisticated with realistic impersonation that scales at speed. AI is enabling attackers to craft messages that mimic real conversations, brands, and even voices, making attacks increasingly stealthy and evasive. Multi-layered email defences, including behaviour-based detection and context-aware analysis, should be leveraged alongside robust cybersecurity awareness training.

CISO Forum: Multi-layer ransomware and double-extortion attacks are on the rise. How should CISOs rethink incident response and recovery planning?

Parag Khurana: Barracuda Research found that one in four Indian ransomware victims experienced data encryption (24%), but many were also affected by locked endpoints (21%), data theft (27%), and the installation of malicious payloads (29%). CISOs need to reduce the blind spots created by security fragmentation. Equally important is redesigning security strategies around rapid detection and containment, secure backups, automated threat response, and clear executive and board communication processes.

CISO Forum: AI-driven SOCs and security co-pilots promise speed and scale, but where must human judgment and governance remain firmly in control?

Parag Khurana: AI-driven SOCs and security co-pilots can accelerate threat detection, triage, and response, but humans must govern the what, why, and how. Automated threat detection and response offer immense benefits, but skilled professionals are needed to provide context, intuition, and to understand nuanced threats. A human-in-the-loop model should be established for any decisions that carry business, regulatory, or ethical implications. Human oversight ensures that rapid AI-powered responses don’t introduce new risks to the business.  Barracuda’s approach is to offer complete protection powered by people and enhanced by AI.

CISO Forum: As enterprises become API- and cloud-native, what are the biggest application and software supply-chain security blind spots CISOs must address?

Parag Khurana: These shifts extend the potential attack surface. Unmanaged or under-protected applications, including third-party software, and cloud misconfigurations, create vulnerable access points for attackers to target and exploit. When businesses are scaling at speed, it is almost inevitable that security controls are implemented inconsistently, disabled, or bypassed. The key is to implement strong authentication, access, and governance policies and to perform regular vulnerability scans.

CISO Forum: Why is secure immutable storage becoming central to ransomware recovery, audit readiness, and regulatory resilience?

Parag Khurana: Many organisations have vulnerable data backups that can be modified, encrypted, or deleted – and most ransomware attacks involve threat actors trying to do any or all of that. Immutable storage ensures that critical data cannot be altered after it’s written, giving businesses a clean, tamper‑proof recovery point even in the worst‑case scenario.

Under India’s Digital Personal Data Protection Act, organisations are required to demonstrate strong data‑handling practices and maintain the integrity of retained information, making secure storage an essential compliance capability. Immutable backups help companies recover and restore data after an attack and maintain high-integrity records for auditors.

Author