Cyber resilience core to sovereignty: Satya Nadella https://etimg.etb2bimg.com/thumb/msid-125933775,imgsize-407925,width-1200,height=627,overlay-etciso,resizemode-75/vulnerabilities-exploits/satya-nadella-cyber-resilience-key-to-national-sovereignty-and-ai-innovation.jpg Microsoft CEO Satya Nadella has insisted that cyber resilience must be an essential pillar of any strategy surrounding sovereignty. He cautioned that autonomy without access to global threat intelligence can create vulnerabilities. While countries are increasingly building sovereign data infrastructure, and mandating that local data remains within the country’s borders, Nadella noted ...
Read More »Demo Blog With Map
Personal Data, Responsibility, and the Role of CISOs at ET CISO Data Protection & Privacy Summit 2025, ETCISO
Personal Data, Responsibility, and the Role of CISOs at ET CISO Data Protection & Privacy Summit 2025, ETCISO At the ET CISO Data Protection & Privacy Summit 2025, Hon’ble Justice (Retd.) B. N. Srikrishna—the architect of India’s foundational data protection framework—delivered a sweeping keynote on the evolving philosophy of personal data and the responsibilities it places on enterprises and their ...
Read More »Enterprises move from securing data to proving trust: Leaders unpack the new competitive advantage at ETCISO DP&P Summit 2025
Enterprises move from securing data to proving trust: Leaders unpack the new competitive advantage at ETCISO DP&P Summit 2025 https://etimg.etb2bimg.com/thumb/msid-125930618,imgsize-88480,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/enterprises-move-from-securing-data-to-proving-trust-leaders-unpack-the-new-competitive-advantage-at-etciso-dpp-summit-2025.jpg At the ET CISO Data Protection & Privacy Summit 2025, senior leaders from fintech, insurance, banking, market infrastructure and digital identity platforms examined how trust is shifting from a moral position to a measurable business strategy. Moderated by Sneha Jha, ...
Read More »New React RSC Vulnerabilities Enable DoS and Source Code Exposure
New React RSC Vulnerabilities Enable DoS and Source Code Exposure https://firewall.firm.in/wp-content/uploads/2025/12/react-flaws.jpg Dec 12, 2025Ravie LakshmananSoftware Security / Vulnerability The React team has released fixes for two new types of flaws in React Server Components (RSC) that, if successfully exploited, could result in denial-of-service (DoS) or source code exposure. The team said the issues were found by the security community while ...
Read More »India building its first OT security testbed: DSCI CEO
India building its first OT security testbed: DSCI CEO https://etimg.etb2bimg.com/thumb/msid-125799440,imgsize-24508,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/india-building-its-first-ot-security-testbed-dsci-ceo.jpg India is emerging as a neutral supplier in the global market for operational technology (OT) security, with the country building its first full-fledged OT security testbed and witnessing the rise of domestic product companies, Data Security Council of India (DSCI) chief executive Vinayak Godse said. Startups and user companies can ...
Read More »What enterprises must do today, ETCISO
What enterprises must do today, ETCISO India’s Digital Personal Data Protection (DPDP) Act and the newly notified DPDP Rules 2025 mark a defining milestone in India’s digital governance journey. It signals India’s transition into a mature, trust-first digital economy. But what sets this framework apart is not just its regulatory strength but the balance that it strikes. It safeguards individual ...
Read More »Digital battlefield: Data dominance, codebreaking and the roots of information warfare
Digital battlefield: Data dominance, codebreaking and the roots of information warfare https://etimg.etb2bimg.com/thumb/msid-125684785,imgsize-255746,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/digital-battlefield-data-dominance-codebreaking-and-the-roots-of-information-warfare.jpg Negligence in data handling leads to large scale data exposure, enabling malicious actors to exploit leaked data for committing fraud, blackmail or identity theft triggering penal statutes. Data is often described as the ‘new oil’ – a strategic asset central to the survival of individuals, corporations or even ...
Read More »Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages https://firewall.firm.in/wp-content/uploads/2025/11/setuptools.jpg Nov 28, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain compromise on the Python Package Index (PyPI) via a domain takeover attack. Software supply chain security company ReversingLabs said it found the ...
Read More »Cyber resilience has to begin long before a breach
Cyber resilience has to begin long before a breach https://etimg.etb2bimg.com/thumb/msid-125579023,imgsize-958737,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/cyber-resilience-has-to-begin-long-before-a-breach.jpg The moment a cyberattack strikes a large organisation, normality fractures into confusion. Systems slow, dashboards flicker and messages pile up faster than anyone can process. In those first minutes, said Arunkumar Selvaraj, global head for security and compliance at TCS Enterprise Cloud, the experience is always brutally disorienting. Selvaraj, speaking ...
Read More »Essential Strategies for Incident Readiness and Recovery, ETCISO
Essential Strategies for Incident Readiness and Recovery, ETCISO The highly connected and always-on global ecosystem in which we live is driven by digital transformation and is constantly evolving. In such an environment, safeguarding our critical infrastructure and manufacturing shop floors is key. Smart factories, automated assembly lines, and the industrial internet of things (IIoT) are closing the gap between physical ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











