Strengthen cyber governance now to avoid regulatory risks https://etimg.etb2bimg.com/thumb/msid-128545386,imgsize-4230,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/strengthen-cyber-governance-to-mitigate-regulatory-risks-and-enhance-compliance.jpg Cybersecurity leaders face a rapidly evolving landscape as new regulations emerge at an unprecedented pace. This surge presents both a challenge and an opportunity. Rather than responding to each change in a reactive and uncoordinated manner, cybersecurity teams must position themselves as enablers and proactively formalize their role in compliance. Gartner ...
Read More »Cyber Security News
6 security signals every CISO should act on, ETCISO
6 security signals every CISO should act on, ETCISO From high-level policy dialogues to hands-on enterprise showcases, the Summit revealed how deeply AI is embedding itself into critical workflows. For CISOs, the implications go far beyond model misuse. The real mandate is architectural: redesign security strategy for AI-native operations. Here are six takeaways grounded in the Summit’s sessions and stage ...
Read More »Why securing consumer data has become a critical business priority in 2026
Why securing consumer data has become a critical business priority in 2026 https://etimg.etb2bimg.com/thumb/msid-128236052,imgsize-85630,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/why-securing-consumer-data-has-become-a-critical-business-priority-in-2026.jpg Every digital interaction leaves a trail. Every click, transaction, and conversation generates information that can reveal preferences, behaviors, and patterns. For businesses, this data is invaluable, a guiding strategy that drives innovation and shapes customer engagement. But, with this opportunity comes responsibility. Cyberattacks are increasing in scale ...
Read More »Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History https://firewall.firm.in/wp-content/uploads/2026/02/chrome-hacks.jpg Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate ...
Read More »Company lifts profit outlook as AI-driven cyber threats surge
Company lifts profit outlook as AI-driven cyber threats surge https://etimg.etb2bimg.com/thumb/msid-128286653,imgsize-839476,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/company-lifts-profit-outlook-as-ai-driven-cyber-threats-surge.jpg Check Point Software Technologies beat fourth-quarter profit expectations on Thursday and said surging demand for protection against AI-driven cyber threats would help lift its 2026 revenue close to $3 billion. Companies are expected to spend more on cybersecurity due to concerns that AI will equip hackers with new and more ...
Read More »3 lessons from Supreme Court’s Meta ruling, ETCISO
3 lessons from Supreme Court’s Meta ruling, ETCISO On February 3, 2026, the Supreme Court of India sent a seismic shockwave through the global technology landscape. In a stern rebuke of Meta and WhatsApp’s “take-it-or-leave-it” privacy policy, the Supreme Court did more than adjudicate a dispute. It set a new constitutional floor for the digital economy. The message was crystal ...
Read More »What is a data breach? Why FSI became the most targeted industry in 2025
What is a data breach? Why FSI became the most targeted industry in 2025 https://etimg.etb2bimg.com/thumb/msid-128018789,imgsize-57236,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/what-is-a-data-breach-why-fsi-became-the-most-targeted-industry-in-2025.jpg A data breach means when hackers steal private information like bank details, passwords, or personal ID from a company’s system. Eva Velasquez from the Identity Theft Resource Center explained this in an interview with Jeffrey Snyder for The Street. In the US, there were more ...
Read More »ZAST.AI Raises $6M Pre-A to Scale
ZAST.AI Raises $6M Pre-A to Scale https://firewall.firm.in/wp-content/uploads/2026/02/zast.gif The Hacker NewsFeb 10, 2026Application Security / Artificial Intelligence January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, bringing ZAST.AI’s total funding close to $10 million. This marks a recognition from leading capital markets of ...
Read More »Most cyber incidents begin with human behaviour, not hackers: Evaa Saiwal, Policybazaar for Business
Most cyber incidents begin with human behaviour, not hackers: Evaa Saiwal, Policybazaar for Business https://etimg.etb2bimg.com/thumb/msid-128140230,imgsize-12238,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/most-cyber-incidents-begin-with-human-behaviour-not-hackers-evaa-saiwal-policybazaar-for-business.jpg Gartner predicts that by 2025, most cyber incidents will stem from human behaviour rather than technology failures, a trend reflected in cyber insurance claims dominated by phishing, credential misuse, and Business Email Compromise. On Safer Internet Day, in conversation with ETCISO, Evaa Saiwal, Head of ...
Read More »A Path to Digital Success, ETCISO
A Path to Digital Success, ETCISO When a payment gateway handles thousands of digital transactions every hour, there is no margin for error. A brief disruption can mean frustrated customers walking away, chargebacks piling up, and reputational damage that takes months to repair. For the fintech powering these transactions, the difference between accelerating growth and facing setbacks often comes down ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











