Top Stories Today
Data leaks are the new retention crisis for D2C brands
March 21, 2026, 3:20 amData breaches in D2C businesses are costing brands dearly. Scammers exploit leaked customer information, leading to lost trust and sales. With new data protection laws in India, companies must prioritize...
Five assumptions AI just made obsolete in your cyber strategy
March 19, 2026, 5:32 amAI has fundamentally altered the threat landscape, rendering traditional security assumptions obsolete. Attackers now possess unprecedented capabilities, blurring lines between nation-state and commodity threats. Enterprises must shift from known adversaries...
Cybersecurity in the age of AI: Why India must align technology with trust
March 19, 2026, 3:20 amIndian enterprises face escalating cybersecurity challenges due to complex, distributed IT environments and a significant human error factor. Automation and AI are crucial for real-time visibility and early anomaly detection,...
Indian insurers quiz firms on AI usage to gauge tech risks
March 17, 2026, 3:56 amCyber insurers in India are asking companies detailed questions about their use of artificial intelligence as a condition for coverage, signalling a shift in how the industry evaluates technology risk....
Most India GCCs still in early stages of DPDP compliance despite ticking 14-month deadline
March 16, 2026, 3:50 amMost global capability centres (GCCs) in India are still in early stages of DPDP compliance, with few moving to structured implementation. Organisations face challenges in adapting global systems, managing HR...
Recent Stories
Tech giants join hands to fight online scams
March 21, 2026, 3:44 amGoogle, Meta, Amazon, and Microsoft, along with other major companies, have launched the Tech Industry Accord to Combat Scams. This initiative aims to tackle rising online fraud. The companies will...
WhatsApp plans usernames, new pricing model to enhance privacy
March 21, 2026, 3:42 amPopular messaging platform WhatsApp is planning to introduce usernames and unique IDs, enabling users to send messages and make voice or video calls without revealing their phone numbers, according to...
Data leaks are the new retention crisis for D2C brands
March 21, 2026, 3:20 amData breaches in D2C businesses are costing brands dearly. Scammers exploit leaked customer information, leading to lost trust and sales. With new data protection laws in India, companies must prioritize...
Millions of infected devices fueled massive cyberattacks
March 20, 2026, 3:35 amA major international operation has successfully taken down four large botnets. These malicious networks infected over three million devices globally, including many in the United States. The botnets were used...
US agency asks companies to secure Microsoft tool after Stryker cyberattack
March 20, 2026, 3:22 amUS authorities are urging companies to bolster security for Microsoft's endpoint management tools following a cyberattack on medical device maker Stryker Corp. The attack, claimed by an Iran-linked group, disrupted...
CISO Movement
My prediction for 2026: The shift to “Machine-Speed Defense”
January 5, 2026, 3:51 amIn 2026, the ‘Human-in-the-Loop’ security model will finally break. As offensive AI agents begin to exploit vulnerabilities in milliseconds, human defenders simply won’t be fast enough to react. We will...
Navigating DPDP: Policy debate or execution challenge?
January 1, 2026, 3:57 amAs CISOs and enterprises adapt to a new set of standards, the bigger question is not about compliance but about how to achieve more.
Nantha Ramalingam to lead cybersecurity at Albertsons (India)
November 14, 2025, 5:16 amNantha Ramalingam joins the US-based retailer from Dyson and will lead cybersecurity and security engineering strategy for the company’s India operations.
Sridhar Govardhan joins Angel One as Group CISO
October 4, 2025, 3:34 amAngel One Limited has appointed Sridhar Govardhan as Group Chief Information Security Officer, leveraging his 25 years of cybersecurity expertise from CoinDCX, Flipkart, and Wipro. He will enhance Angel One’s...
BOBCARD names Arnab Biswas as Chief Information Security Officer
September 16, 2025, 3:40 amBOBCARD, a Bank of Baroda subsidiary, has appointed Arnab Biswas as CISO.
Corporate
Microsoft appoints Aman Malhotra as Security Solution Engineering Leader for India & South Asia
March 5, 2026, 7:06 amMicrosoft has appointed Aman Malhotra as its new Security Solution Engineering Leader for India and South Asia. Malhotra will guide enterprises in strengthening their cybersecurity. He will focus on cloud...
CrowdStrike forecasts fiscal 2027 revenue above estimates on cybersecurity tools demand
March 5, 2026, 4:02 amShares of cybersecurity companies, including CrowdStrike, have fallen recently as investors assessed the potential impact of AI startup Anthropic's Claude Code Security tool, even as some analysts said the worries...
Incident readiness: Can you answer ‘What Happened?’ Before the first hour is gone?
March 3, 2026, 11:12 amWhen an incident hits, the biggest challenge isn’t detecting alerts—it’s quickly producing a credible, evidence-backed account of what happened, what’s impacted, and what to do next. The article explains why...
Google is establishing a full-stack AI hub, part of our 15 billion USD investment in India
February 19, 2026, 10:30 amSundar Pichai addressed the India AI Impact Summit 2026, recalling his student journey and highlighting India's rapid transformation. He announced Google's full-stack AI hub in Visakhapatnam as part of a...
JioHotstar partners OpenAI to launch ChatGPT-powered conversational streaming in India
February 19, 2026, 9:30 amJioHotstar-OpenAI deal: For more than a decade, digital entertainment has largely been a one-way experience: browse, click, watch. With this rollout, JioHotstar is positioning streaming as a two-way interaction that...
Data Breaches
Tech giants join hands to fight online scams
March 21, 2026, 3:44 amGoogle, Meta, Amazon, and Microsoft, along with other major companies, have launched the Tech Industry Accord to Combat Scams. This initiative aims to tackle rising online fraud. The companies will...
Data leaks are the new retention crisis for D2C brands
March 21, 2026, 3:20 amData breaches in D2C businesses are costing brands dearly. Scammers exploit leaked customer information, leading to lost trust and sales. With new data protection laws in India, companies must prioritize...
Millions of infected devices fueled massive cyberattacks
March 20, 2026, 3:35 amA major international operation has successfully taken down four large botnets. These malicious networks infected over three million devices globally, including many in the United States. The botnets were used...
TRU identifies mobile spyware campaign using fake Red Alert app in Israel
March 18, 2026, 3:21 amIsraeli users are targeted by a smishing campaign impersonating Home Front Command alerts, distributing a trojanized Red Alert app. This malicious app steals sensitive data like SMS, contacts, and location...
Cognizant unit TriZetto breach exposes data of 3.4m people
March 9, 2026, 4:14 amCognizant subsidiary TriZetto Provider Solutions (TPS) experienced a data breach affecting approximately 3.4 million individuals. Suspicious activity detected in October 2025 led to unauthorized access of sensitive health information, including...
Vulnerabilities & Exploits
Indusface AppSec 2026: 9 billion attacks blocked in India as AI-led exploits rise
March 12, 2026, 3:22 amIndia witnessed a 27% surge in blocked malicious requests in 2025, exceeding 9 billion. Attackers shifted to shorter, targeted LLM-driven assaults, with APIs becoming the primary target, experiencing an eightfold...
87% of organizations are running software with known, exploitable vulnerabilities
March 9, 2026, 4:08 amA recent DevSecOps report reveals that 87% of organizations have known exploitable vulnerabilities, with aging software dependencies and rapid adoption of new third-party libraries increasing risks. CI/CD pipelines are particularly...
Securing robotic process automation in modern supply chains
December 22, 2025, 3:35 amThe process of managing cybersecurity systems which combines operational efficiency with potential security weaknesses.
Cyber resilience core to sovereignty: Satya Nadella
December 13, 2025, 2:30 amMicrosoft CEO Satya Nadella emphasized cyber resilience as crucial for sovereignty, warning that isolation from global threat intelligence creates vulnerabilities. He highlighted AI's role in evolving software development and announced...
WhatsApp just warned of hacking campaign targeting users: Simple tips to tell if your phone has been hacked
September 1, 2025, 6:22 amWhatsApp has addressed a vulnerability exploited by hackers targeting Apple users with spyware designed to steal data. This follows Apple's fix for a related bug. Compromised phones often exhibit subtle...
NextGen Tech
Goa govt to roll out AI, deep-tech policy in 100 days: Minister
March 13, 2026, 1:21 pmGoa is set to unveil its AI and deep-tech policy within 100 days. The state aims to cultivate local talent and develop indigenous technological solutions. This initiative aligns with the...
McKinsey realises the risk of rapid adoption of AI after hackers gain access to 46.5 million employee chat messages, 728000 ‘sensitive files’
March 13, 2026, 1:08 pmA cybersecurity researcher's AI agent accessed millions of McKinsey employee chat messages and hundreds of thousands of sensitive file names within two hours, exposing the firm's internal AI platform, Lilli....
Connected vehicles are turning cybersecurity into a mobility infrastructure problem
March 13, 2026, 1:07 pmConnected vehicles now function as enterprise digital endpoints, necessitating a convergence of IT and automotive cybersecurity. This shift demands robust identity and access management, secure API protocols, and resilient software...
What Indian banks can expect on regulation and compliance front in 2026
December 29, 2025, 3:47 amBanks are staring at a compliance-intensive 2026 as the Reserve Bank of India rolls out new rules on digital banking, basic savings accounts, liquidity management, payment authentication, and group-level governance,...
India's GCCs go on leadership hunt
December 26, 2025, 3:24 amGlobal capability centres in India are seeing a significant rise in senior leadership hiring. These centres are evolving from back-office operations to strategic hubs. Companies are shifting more global mandates...
CISO Strategies
India records 265 million cyber attacks; Seqrite releases the India cyber threat report 2026
December 11, 2025, 3:37 amSeqrite’s India cyber threat report 2026 outlines cyber threats observed between October 2024 and September 2025, including high volumes of malware, ransomware, and network exploits across regions and key sectors....
In 2026, AI to the rescue of the CISOs to strengthen the enterprise defense against cyber threats
December 11, 2025, 12:35 amIndian businesses will boost IT spending in 2026, focusing on AI and data centers. Cybercrime will evolve with AI agents and dark AI tools. However, AI will also help close...
The human factor: The one threat CISOs can’t patch
November 19, 2025, 3:35 am“The Human Factor” is the cyber threat no firewall can block. From AI-powered scams to everyday mistakes, here is why people, not machines, remain the most unpredictable risk and how...
Cybersecurity gets smarter with GenAI: A CISO’s guide to staying ahead of AI-driven threats
October 14, 2025, 4:10 amGenerative AI is transforming cybersecurity, offering powerful defense automation while simultaneously fueling sophisticated new threats. Organizations face a critical need to implement robust AI governance and security controls to counter...
AI, law, and authenticity: Building trust and creativity at ETCISO Annual Conclave 2025
September 22, 2025, 5:05 amFrom digital disruption to cinematic storytelling, leaders at ETCISO Annual Conclave 2025 explored how trust, responsibility, and authenticity define success in a rapidly changing world.
Identity & Access Management
Elon Musk's AI startup xAI has made it mandatory for employees to install 'spy software' on their laptops
July 15, 2025, 1:02 pmElon Musk's xAI has reportedly mandated its employees to install Hubstaff, a monitoring software, on company laptops. This decision, aimed at bolstering security, has sparked privacy concerns among staff training...
Cloud incidents linked to IM misconfigurations: What's next? Praveen Mishra, Yes Bank weighs In
September 8, 2023, 6:06 amCloud misconfiguration and compromised access led to the biggest data breach incidents in the past year. Identity and Access Management (IAM) misconfigurations alone contributed to 65% of observed cloud security...
The world’s nearing the end of the user ID, password age
September 5, 2023, 4:25 amA very interesting passwordless initiative that could have a transformational impact on Indians in the coming years is one that has been recently launched by the National Skill Development Corporation...
Security flaw exposes users' emails, passwords of 'smart' chastity cage maker
September 4, 2023, 3:38 amAccording to TechCrunch, the researcher gained access to a database containing records of over 10,000 users using two vulnerabilities. The researcher exploited the bugs to see what data it could...
This AI model can steal passwords by ‘listening’ to the keyboard, here's how
August 18, 2023, 3:49 amUK scientists have created an AI model that can identify sound waves generated whilst typing, even during a video call, which could lead to hackers stealing passwords with near-perfect accuracy,...
Cybercrime & Fraud
US agency asks companies to secure Microsoft tool after Stryker cyberattack
March 20, 2026, 3:22 amUS authorities are urging companies to bolster security for Microsoft's endpoint management tools following a cyberattack on medical device maker Stryker Corp. The attack, claimed by an Iran-linked group, disrupted...
Five assumptions AI just made obsolete in your cyber strategy
March 19, 2026, 5:32 amAI has fundamentally altered the threat landscape, rendering traditional security assumptions obsolete. Attackers now possess unprecedented capabilities, blurring lines between nation-state and commodity threats. Enterprises must shift from known adversaries...
How Mastercard's new GenAI model predicts transactions and detect fraud
March 19, 2026, 3:35 amMastercard has unveiled a new generative AI model built on a "large tabular model" (LTM) architecture, specifically designed for financial data. This LTM analyzes billions of transaction records to predict...
Cybersecurity in the age of AI: Why India must align technology with trust
March 19, 2026, 3:20 amIndian enterprises face escalating cybersecurity challenges due to complex, distributed IT environments and a significant human error factor. Automation and AI are crucial for real-time visibility and early anomaly detection,...
RBI seeks banks’ views on AI-based facial recognition tools at ATMs, branches to curb fraud
March 18, 2026, 3:23 amAs per the draft guidelines, a bona fide victim, being an individual person and having lodged a complaint involving gross loss of an amount up to Rs 50,000 on account...
GRC
Japan delays cybersecurity bill amid political uncertainties
November 4, 2024, 8:17 amDespite an expert panel issuing an interim report on strengthening cybersecurity in August, progress stalled when former Prime Minister Fumio Kishida decided not to seek re-election within the Liberal Democratic...
Temu to be investigated by EU tech regulators over sale of illegal products
November 1, 2024, 5:21 amThe European Commission launched its probe under the Digital Services Act (DSA), which requires very large online platforms such as Temu to do more to tackle illegal and harmful content...
Hong Kong bars services like WhatsApp and Google Drive from government computers
October 24, 2024, 5:50 amThe latest IT security guidelines from the Digital Policy Office have many civil servants complaining about added inconvenience.
MHA issues advisory to create 'Special Wing of Cyber Commandos' in all states to counter cyber threats
October 24, 2024, 5:41 amIn the past week, Indian airlines have received more than 100 hoax bomb threats resulting in inconvenience to passengers and monetary loss to the airlines . Most of the threats...
India, US, Australia and Japan announce continuation of Quad Cyber Challenge
October 22, 2024, 5:20 amIndia, the US, Australia and Japan have announced the continuation of the Quad Cyber Challenge for strengthening responsible cyber ecosystems, promoting public resources, and raising cybersecurity awareness.
OT Security
WhatsApp plans usernames, new pricing model to enhance privacy
March 21, 2026, 3:42 amPopular messaging platform WhatsApp is planning to introduce usernames and unique IDs, enabling users to send messages and make voice or video calls without revealing their phone numbers, according to...
Endpoint central gets secure private access
March 19, 2026, 3:34 amManageEngine's Endpoint Central now integrates EDR and secure private access, offering unified threat detection, remediation, and device-based access control. This expansion addresses the complexities of managing distributed workforces and increasing...
Most India GCCs still in early stages of DPDP compliance despite ticking 14-month deadline
March 16, 2026, 3:50 amMost global capability centres (GCCs) in India are still in early stages of DPDP compliance, with few moving to structured implementation. Organisations face challenges in adapting global systems, managing HR...
Data visibility, classification and collaboration are central to privacy resilience, say industry leaders
March 16, 2026, 3:27 amAt ETCISO Secufest 2026, privacy and security leaders said organizations must treat data as a business asset, strengthen discovery and governance, and build privacy into workflows rather than reducing it...
Razorpay’s Praveen Parihar warns of ‘AI blind spots’ in vendor risk management
March 16, 2026, 3:22 amAt ETCISO Secufest 2026, the Razorpay CISO highlighted how traditional third-party risk frameworks are failing to address the emerging risks posed by AI-native SaaS platforms and autonomous agents.