G4S India’s AI shift: From guards on the ground to ‘Phygital’ security https://etimg.etb2bimg.com/thumb/msid-124453423,imgsize-241896,width-1200,height=627,overlay-etciso,resizemode-75/next-gen-tech/g4s-indias-ai-shift-from-guards-on-the-ground-to-phygital-security.jpg Rajeev Sharma, Country Managing Director, G4S India When Rajeev Sharma, Country Managing Director at G4S India, talks about the company’s AI transformation, he keeps it simple, sans jargon. “AI is driving G4S India’s transformation from a manpower-heavy security provider into a technology-first ‘phygital’ solutions company,” he tells ...
Read More »Cyber Security News
The growing urgency of IoT and mobile security in India, ETCISO
The growing urgency of IoT and mobile security in India, ETCISO India is at the forefront of a revolution in smart technology. The Internet of Things (IoT) has become a seamless part of our daily lives, from voice-activated assistants and wearables to smart lighting and connected appliances. According to a recent Redseer report, smart device penetration in Indian homes has ...
Read More »Canada’s WestJet says some passenger data exposed in cybersecurity breach
Canada’s WestJet says some passenger data exposed in cybersecurity breach https://etimg.etb2bimg.com/thumb/msid-124247093,imgsize-964241,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/canadas-westjet-says-some-passenger-data-exposed-in-cybersecurity-breach.jpg Canadian carrier WestJet said on Monday the personal information of some passengers was exposed in a cybersecurity breach earlier this year, though no payment data was compromised. The airline said it detected suspicious activity on June 13 and later determined that a “sophisticated, criminal third party” had gained unauthorized ...
Read More »Step Into the Password Graveyard… If You Dare (and Join the Live Session)
Step Into the Password Graveyard… If You Dare (and Join the Live Session) https://firewall.firm.in/wp-content/uploads/2025/10/password-security.jpg Oct 08, 2025The Hacker NewsPassword Security / Cyber Attacks Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don’t need advanced tools; they just need one careless login. For IT teams, that means endless resets, ...
Read More »Browser Security at a Glance: Things Every CISO Must Know
Browser Security at a Glance: Things Every CISO Must Know https://etimg.etb2bimg.com/thumb/msid-124377901,imgsize-37850,width-1200,height=627,overlay-etciso,resizemode-75/brand-solution/browser-security-at-a-glance-things-every-ciso-must-know.jpg With browsers becoming the new endpoint that enables authentication, access, communication and collaboration, the need for browsers as a first line of defense in modern security has been clearly established. We take a look at important facts CISOs must know about browser-related threats in the current security landscape, the ...
Read More »C-Suite’s rush to AI blinds leadership to critical security failures, ETCISO
C-Suite’s rush to AI blinds leadership to critical security failures, ETCISO As organisations aggressively pursue technologies like artificial intelligence, a dangerous disconnect is growing between innovation and security. Data from Tenable’s State of Cloud and AI Security 2025 report reveals that critical strategic errors – from a reliance on outdated assumptions to the use of purely reactive performance metrics – ...
Read More »Tenable exposes AI flaws in Google gemini that could have let hackers steal data from millions
Tenable exposes AI flaws in Google gemini that could have let hackers steal data from millions https://etimg.etb2bimg.com/thumb/msid-124284799,imgsize-39892,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/google-gemini-ai-vulnerabilities-exposed-by-tenable.jpg Tenable, the exposure management company, has identified three vulnerabilities in Google’s Gemini suite, collectively dubbed the Gemini Trifecta. These flaws, now remediated, exposed users to significant privacy risks that could have enabled attackers to manipulate Gemini’s behavior and silently steal sensitive data such ...
Read More »Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files
Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files https://firewall.firm.in/wp-content/uploads/2025/10/zimbra-email-hacking.jpg Oct 06, 2025Ravie LakshmananEmail Security / Zero-Day A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the Brazilian military. Tracked as CVE-2025-27915 (CVSS score: 5.4), the vulnerability is a stored cross-site scripting (XSS) vulnerability in the Classic ...
Read More »Tata Motors shares in focus as JLR prepares £500 million loan to recover from cyberattack disruption
Tata Motors shares in focus as JLR prepares £500 million loan to recover from cyberattack disruption https://etimg.etb2bimg.com/thumb/msid-124329974,imgsize-74936,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/tata-motors-shares-in-focus-as-jlr-prepares-500-million-loan-to-recover-from-cyberattack-disruption.jpg Tata Motors shares are expected to be in focus on Monday, October 6, after its UK-based subsidiary, Jaguar Land Rover (JLR) Automotive Plc, announced plans to raise a privately arranged loan of up to £500 million (approximately $674 million). The funds are intended ...
Read More »AI-powered proactive cyber defense in digital age, ETCISO
AI-powered proactive cyber defense in digital age, ETCISO In today’s hyperconnected world, cyberattacks have evolved from crude email scams into sophisticated, persistent threats that target governments, corporations, and individuals alike. Traditional security systems—firewalls, antivirus programs, and signature-based detection—are no longer sufficient to keep pace with the rapidly shifting tactics of hackers. The need for faster, smarter, and more adaptive defense ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











