Visibility Top Priority for Org’s to manage Cyber Complexity & be Competitive: Vinay Sharma, Regional Director, India & SAARC, NETSCOUT

Visibility a top priority for Org’s to manage growing complexity & remain competitive: Vinay Sharma, Regional Director, India & SAARC, NETSCOUT In today’s time cyber adversaries are more resilient, take-down-resistant networks that makes tough for  detection to mitigation strategies for security teams. It is important that network operations teams insights to fine-tune their strategies to…

Read More

Cyber Security Exercise Launched by Armed forces, ‘CyberThis multi-phased exercise, which concludes on June 27, is a proactive step towards bolstering cyber resilience at national level, and encompasses the conduct of targeted training sessions, evaluation and an engaging capsule for leadership, it said.

The armed forces on Monday launched a 12-day cyber security exercise, called Cyber Suraksha, to simulate real-world threats and reinforce secure practices, the defence ministry said. The exercise is a proactive step towards bolstering cyber resilience at the national level, it said in a statement. The cyber domain is among the nine areas identified by…

Read More

Cybercrime is easy to commit & very hard, to stop,” said Dr. Eric Cole, a former CIA hacker, founder of cybersecurity consultancy Secure Anchor

Cybercrime is predicted to cost the world $10.5 trillion USD in 2025, according to Cybersecurity Ventures. If it were measured as a country, then cybercrime would be the world’s third largest economy after the U.S. and China. This represents the greatest transfer of economic wealth in history, risks the incentives for innovation and investment, is exponentially…

Read More

CISA Issues New Guidelines to Secure Network Edge Devices Against Cyber Threats

CISA have unveiled comprehensive guidance to help organizations safeguard their network edge devices from increasingly sophisticated cyber threats. The initiative, coordinated across multiple nations, addresses critical vulnerabilities in firewalls, routers, VPN gateways and operational technology systems that serve as primary entry points for malicious actors like IOT devices. The cybersecurity guidance represents an unprecedented collaboration…

Read More

India’s Cyber Risk Profile Intensifies with AI-Driven Threats; Trend Micro Cyber Risk Report 2025

India ranks 2 nd globally in email threats, contributing 6.9% to global detections and nearly 24% to Asia’s total India holds 3 rd place globally in malware detections, responsible for 4.74% of all global threats Banking, Financial Services, and Government sectors remain the most targeted in India   Trend Micro Incorporated (TYO: 4704; TSE: 4704),…

Read More

Patero Announces Launch of CryptoQoR Post-Quantum Cryptography Software

PQC solution can be immediately deployed into existing infrastructure to remediate risks associated with quantum attacks. Patero, in post-quantum cryptography (PQC),  announced the launch CryptoQoR™. This new highly efficient crypto-agile software module establishes secure communication channels and proactively mitigates security risks using hybrid post-quantum encryption. The solution can be readily deployed into existing infrastructure to improve current cryptographic…

Read More

Kettering Health Confirms, Interlock Ransomware Breached Systems to Stole Data

Kettering Health, a prominent healthcare network, has confirmed that its systems were compromised by the notorious Interlock ransomware group on May 20, 2025, in what marks another significant cyberattack targeting critical healthcare infrastructure. The healthcare provider disclosed the breach in an official statement released on June 5, 2025, outlining comprehensive remediation efforts and ongoing recovery operations following…

Read More

Data broker LexisNexis Risk Solutions (LNRS) has confirmed a Data breach

Data broker LexisNexis Risk Solutions (LNRS) has confirmed a data breach that compromised the personal information of over 364,000 people. LexisNexis operates in 40 countries, has customers worldwide, and employs over 11,500 people. The subsidiary of the British data analytics conglomerate RELX works with 91% of Fortune 100 companies and 85% of Fortune 500 companies,…

Read More

Quantum Force Firewalls Bring Lightning-Fast Cyber Security to the Branch Office

Our hyperconnected world demands more from cyber security than ever before. Security leaders must prevent intrusions at the network level, but also protect a distributed, cloud-enabled workforce in hybrid roles and in branch offices with the same enterprise-grade security that protects a company’s headquarters.   A significant portion of work – and the workforce – resides…

Read More

Check Point Launches of local harmony SASE data residency instance

Harmony SASE (Secure Access Service Edge) is a cloud-delivered security platform that integrates multiple network security functions into a unified system. Check Point Software Technologies has introduced an India-based data residency instance of its Harmony SASE platform. This is aimed at supporting local regulatory requirements and growing demand for secure cloud adoption. The move marks…

Read More