Accenture’s cybersecurity business is worth about $10 billion, with around 30,000 security professionals worldwide. Of these, 13,000 are based in India
Joshi said cyber fraud now affects individuals and enterprises alike
A quick, practical response plan to stop recovery pressure, fix your credit record, and reduce the chances of repeat misuse.
The audit will span the entire stack of government information communication technology (ICT) assets, from routers, firewalls and intrusion-prevention systems to servers, virtual machines, cloud deployments, endpoint devices and security operations centres.
Karnataka's IT minister Priyank Kharge said the partnerships are intended to unlock new economic opportunities, and build technical capability.
Tax transparency must be seen as more than a compliance measure, the finance minister has said, describing it as 'foundation of sustainable development and fiscal resilience'
The UK is investigating whether Chinese manufacturer Yutong can remotely disable its electric buses, following similar probes in Norway and Denmark.
The draft rules states that any organization that owns, operates, manages, or interfaces with power infrastructure connected to the electricity grid will have to prepare a board-approved cyber security policy, designate a Chief Information Security Officer (CISO), and align to standards by the Power Ministry.
Bengaluru-based deeptech startup Pantherun Technologies cracked a decades-old encryption flaw using an AI-based system that requires no key exchange. From shielding airbases and railways to partnering with majors like Intel, the Qualcomm-mentored startup is rewriting how data moves and stays secure.
Wipro’s latest cybersecurity report found that 75% of enterprises lack expertise to defend against AI-led attacks, and 86% of recent breaches involve nation-state actors, a sign of how quickly digital espionage is escalating.
Several stakeholders and privacy advocates say the rules are potentially invasive and are an overreach, expanding DoT’s jurisdiction over non-telecom entities, which could lead to mass processing of personal data
Operant AI estimates that trillions of private records could be exposed through such zero-click data leaks.
Reflecting on the incident, the Zerodha CEO stressed that technical safeguards alone cannot eliminate risk. 'As important as technical cybersecurity are human processes, policies, and procedures that account for worst-case scenarios and the psychology of the weakest link — which is us,' Nithin Kamath said.
National Security Council Secretariat's Narendranath Gangavarapu says consultations are underway across ministries and industry; strategy aims to unify cybersecurity efforts nationwide.
India’s cybersecurity agency warns of a fast-spreading npm supply chain worm, urging startups and ITes firms to secure credentials and audit dependencies.
The warning underlines growing concerns over cyber frauds targeting Indian government institutions.
Annual audits now expected across public and private sector entities, AI tools to be evaluated through AIBOM disclosures
Currently, wind turbine components such as blades, towers, gearboxes and generators are mostly imported from China.
The IIT Bombay-incubated and Palo Alto-headquartered startup claims to be building an autonomous AI layer for cyber-risk management and to be the first to offer fully autonomous CTEM and TPRM solutions
Stakeholders have called on the Department of Telecommunications (DoT) to pause and re-evaluate the proposed rules, conduct broader stakeholder consultations, and align the framework with existing laws and global best practice
Accel has backed six cybersecurity startups, including Akto and Seezo, both of which are gaining ground globally with AI-native, differentiated products.
Move to new NIC email domain comes as precaution; no breach of government emails reported so far, say officials
Worried about hackers getting into your phone? You’re not alone. Our phones carry personal messages, banking details, photos, and more. Here are five easy steps to keep your phone safe from cyberattacks.
The tool is also being applied to strengthen the security of widely-used open-source software, vastly increasing the scale and speed of defensive coverage.
As AI agents become more powerful, capable of reading emails, pulling data from APIs and even sending messages or making transactions, a serious security threat is taking shape