Cyber resilience core to sovereignty: Satya Nadella https://etimg.etb2bimg.com/thumb/msid-125933775,imgsize-407925,width-1200,height=627,overlay-etciso,resizemode-75/vulnerabilities-exploits/satya-nadella-cyber-resilience-key-to-national-sovereignty-and-ai-innovation.jpg Microsoft CEO Satya Nadella has insisted that cyber resilience must be an essential pillar of any strategy surrounding sovereignty. He cautioned that autonomy without access to global threat intelligence can create vulnerabilities. While countries are increasingly building sovereign data infrastructure, and mandating that local data remains within the country’s borders, Nadella noted ...
Read More »Author Archives: firewallsfirmadmin
The Game-Changing Role of Agentic AI in Predicting and Preventing Cyberattacks, ETCISO
The Game-Changing Role of Agentic AI in Predicting and Preventing Cyberattacks, ETCISO The ever-increasing cyber attackers have been a major hindrance to businesses and cost them millions every year. This evolving cyber threats landscape makes it necessary to adopt cutting-edge solutions in order to get ahead of these attackers. Traditional cybersecurity measures, relying on reactive approaches, often fall short in ...
Read More »Personal data is not property—but CISOs must treat it with utmost responsibility’: Justice B. N. Srikrishna at ET CISO Data Protection & Privacy Summit 2025
Personal data is not property—but CISOs must treat it with utmost responsibility’: Justice B. N. Srikrishna at ET CISO Data Protection & Privacy Summit 2025 https://etimg.etb2bimg.com/thumb/msid-125927799,imgsize-54080,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/justice-b-n-srikrishna-personal-data-responsibility-and-the-role-of-cisos-at-et-ciso-data-protection-privacy-summit-2025.jpg At the ET CISO Data Protection & Privacy Summit 2025, Hon’ble Justice (Retd.) B. N. Srikrishna—the architect of India’s foundational data protection framework—delivered a sweeping keynote on the evolving philosophy of personal data and ...
Read More »Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features https://firewalls.firm.in/wp-content/uploads/2025/12/android-malware.jpg Cybersecurity researchers have disclosed details of two new Android malware families dubbed FvncBot and SeedSnatcher, as another upgraded version of ClayRat has been spotted in the wild. The findings come from Intel 471, CYFIRMA, and Zimperium, respectively. FvncBot, which masquerades as a security app developed by mBank, targets ...
Read More »‘AI nightmare’: Google CEO Sundar Pichai reveals the one threat that keeps him awake at night
‘AI nightmare’: Google CEO Sundar Pichai reveals the one threat that keeps him awake at night https://etimg.etb2bimg.com/thumb/msid-125732812,imgsize-655848,width-1200,height=627,overlay-etciso,resizemode-75/corporate/ai-nightmare-google-ceo-sundar-pichai-reveals-the-one-threat-that-keeps-him-awake-at-night.jpg Artificial intelligence is evolving at breakneck speed. Breakthroughs arrive almost weekly, new tools promise to transform medicine and work, and entire industries are scrambling to catch up. Yet alongside the excitement, a growing unease is settling in. The more powerful these systems become, ...
Read More »The first step to data protection is visibility and control, ETCISO
The first step to data protection is visibility and control, ETCISO As AI drives up both the volume and value of enterprise data, cybercriminals are matching pace with increasingly sophisticated attacks. At the same time, organizations operate across sprawling data environments, where each platform enforces its own security and governance models. This creates complexity, data silos, and inconsistent controls, making ...
Read More »Digital battlefield: Data dominance, codebreaking and the roots of information warfare
Digital battlefield: Data dominance, codebreaking and the roots of information warfare https://etimg.etb2bimg.com/thumb/msid-125684785,imgsize-255746,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/digital-battlefield-data-dominance-codebreaking-and-the-roots-of-information-warfare.jpg Negligence in data handling leads to large scale data exposure, enabling malicious actors to exploit leaked data for committing fraud, blackmail or identity theft triggering penal statutes. Data is often described as the ‘new oil’ – a strategic asset central to the survival of individuals, corporations or even ...
Read More »ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories https://firewalls.firm.in/wp-content/uploads/2025/11/threatsday.jpg Nov 27, 2025Ravie LakshmananCybersecurity / Hacking News Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there’s a lot happening in the cyber world. Criminals are getting creative — using smart ...
Read More »Cyber resilience has to begin long before a breach
Cyber resilience has to begin long before a breach https://etimg.etb2bimg.com/thumb/msid-125579023,imgsize-958737,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/cyber-resilience-has-to-begin-long-before-a-breach.jpg The moment a cyberattack strikes a large organisation, normality fractures into confusion. Systems slow, dashboards flicker and messages pile up faster than anyone can process. In those first minutes, said Arunkumar Selvaraj, global head for security and compliance at TCS Enterprise Cloud, the experience is always brutally disorienting. Selvaraj, speaking ...
Read More »Essential Strategies for Incident Readiness and Recovery, ETCISO
Essential Strategies for Incident Readiness and Recovery, ETCISO The highly connected and always-on global ecosystem in which we live is driven by digital transformation and is constantly evolving. In such an environment, safeguarding our critical infrastructure and manufacturing shop floors is key. Smart factories, automated assembly lines, and the industrial internet of things (IIoT) are closing the gap between physical ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











