‘AI nightmare’: Google CEO Sundar Pichai reveals the one threat that keeps him awake at night https://etimg.etb2bimg.com/thumb/msid-125732812,imgsize-655848,width-1200,height=627,overlay-etciso,resizemode-75/corporate/ai-nightmare-google-ceo-sundar-pichai-reveals-the-one-threat-that-keeps-him-awake-at-night.jpg Artificial intelligence is evolving at breakneck speed. Breakthroughs arrive almost weekly, new tools promise to transform medicine and work, and entire industries are scrambling to catch up. Yet alongside the excitement, a growing unease is settling in. The more powerful these systems become, ...
Read More »Blog
The first step to data protection is visibility and control, ETCISO
The first step to data protection is visibility and control, ETCISO As AI drives up both the volume and value of enterprise data, cybercriminals are matching pace with increasingly sophisticated attacks. At the same time, organizations operate across sprawling data environments, where each platform enforces its own security and governance models. This creates complexity, data silos, and inconsistent controls, making ...
Read More »Digital battlefield: Data dominance, codebreaking and the roots of information warfare
Digital battlefield: Data dominance, codebreaking and the roots of information warfare https://etimg.etb2bimg.com/thumb/msid-125684785,imgsize-255746,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/digital-battlefield-data-dominance-codebreaking-and-the-roots-of-information-warfare.jpg Negligence in data handling leads to large scale data exposure, enabling malicious actors to exploit leaked data for committing fraud, blackmail or identity theft triggering penal statutes. Data is often described as the ‘new oil’ – a strategic asset central to the survival of individuals, corporations or even ...
Read More »ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories https://firewalls.firm.in/wp-content/uploads/2025/11/threatsday.jpg Nov 27, 2025Ravie LakshmananCybersecurity / Hacking News Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there’s a lot happening in the cyber world. Criminals are getting creative — using smart ...
Read More »Cyber resilience has to begin long before a breach
Cyber resilience has to begin long before a breach https://etimg.etb2bimg.com/thumb/msid-125579023,imgsize-958737,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/cyber-resilience-has-to-begin-long-before-a-breach.jpg The moment a cyberattack strikes a large organisation, normality fractures into confusion. Systems slow, dashboards flicker and messages pile up faster than anyone can process. In those first minutes, said Arunkumar Selvaraj, global head for security and compliance at TCS Enterprise Cloud, the experience is always brutally disorienting. Selvaraj, speaking ...
Read More »Essential Strategies for Incident Readiness and Recovery, ETCISO
Essential Strategies for Incident Readiness and Recovery, ETCISO The highly connected and always-on global ecosystem in which we live is driven by digital transformation and is constantly evolving. In such an environment, safeguarding our critical infrastructure and manufacturing shop floors is key. Smart factories, automated assembly lines, and the industrial internet of things (IIoT) are closing the gap between physical ...
Read More »Comcast to pay $1.5 million US fine after vendor data breach
Comcast to pay $1.5 million US fine after vendor data breach https://etimg.etb2bimg.com/thumb/msid-125554889,imgsize-65124,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/comcast-to-pay-1-5-million-us-fine-after-vendor-data-breach.jpg Comcast will pay a $1.5 million fine after a vendor breach exposed personal data from 237,000 current and former customers, the Federal Communications Commission said on Monday. The FCC said a debt collector used by Comcast until 2022, Financial Business and Consumer Solutions, suffered a 2024 data breach ...
Read More »JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers https://firewalls.firm.in/wp-content/uploads/2025/11/update-windows.jpg Cybersecurity researchers are calling attention to a new campaign that’s leveraging a combination of ClickFix lures and fake adult websites to deceive users into running malicious commands under the guise of a “critical” Windows security update. “Campaign leverages fake adult websites (xHamster, PornHub clones) as its ...
Read More »Above and Beyond the Browser : Why It’s Now Your Security Perimeter
Above and Beyond the Browser : Why It’s Now Your Security Perimeter https://etimg.etb2bimg.com/thumb/msid-125556921,imgsize-58244,width-1200,height=627,overlay-etciso,resizemode-75/brand-solution/transforming-browsers-into-security-perimeters-the-future-of-enterprise-security.jpg In today’s hyperconnected workplace, the biggest threat to your organization might already be inside your network. Hybrid work, SaaS adoption, AI and LLM tools have blurred the boundaries of security, making the humble browser a high-stakes frontline. The data tells a clear story. A Ponemon Institute study ...
Read More »Mahindra First Choice Wheels Transforms Used Vehicle Pricing with AI, ETCISO
Mahindra First Choice Wheels Transforms Used Vehicle Pricing with AI, ETCISO This ETCIO DeepTalks conversation with Chandra Shekhar Prasad, Head – AI Products & Solutions, Mahindra Group, explores how Mahindra First Choice Wheels turned messy, inconsistent used-vehicle data into a strategic asset. Prasad explains how a unified pricing engine, Indian Blue Book, and AI-driven vehicle inspections created real business impact, ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











