spot_img

Cyber Security

The Rise of Cyber Cartels: How the Dark Web Fuels Digital Extortion?

In 2025, cybercrime has evolved beyond individual hackers or little ransomware criminal gangs into something greater, more organised, and just as dangerous: Cyber cartels....

Staying Ahead of AI Scams: 63SATS Cybertech’s Srinivas L on How CYBX Is Protecting India’s Digital Users

In an interaction with TechGraph, Srinivas L, Joint Managing Director and Joint CEO of 63SATS Cybertech, outlined how the surge in digital payments, online...

Latest News

The Rise of Cyber Cartels: How the Dark Web Fuels Digital Extortion?

In 2025, cybercrime has evolved beyond individual hackers or little ransomware criminal gangs into something greater, more organised, and just as dangerous: Cyber cartels....

Staying Ahead of AI Scams: 63SATS Cybertech’s Srinivas L on How CYBX Is Protecting India’s Digital Users

In an interaction with TechGraph, Srinivas L, Joint Managing Director and Joint CEO of 63SATS Cybertech, outlined how the surge in digital payments, online...

The Human Edge of AI: ManageEngine’s Subhalakshmi Ganapathy on Redefining Enterprise Security in the Cloud Era

Speaking with TechGraph, Subhalakshmi Ganapathy, Chief IT Security Evangelist at ManageEngine (Zoho Corp), discussed how the rapid adoption of hybrid and multi-cloud environments is...

Why Do Cyber Criminals Target Human Psychology, and How Can We Outsmart Them?

In previous decades, the primary efforts of cybersecurity have centered around the construction of digital barriers, such as firewalls, antivirus systems, and intricate encryption....

The digital illusion: Millennials & risks of online trust

Born into connected world, Millennials seamlessly blend their social, professional, and financial lives online. The digital world is an intrinsic part of their lives...

Redefining Cyber Defense: Ankit Sharma on How Cyble AI Is Strengthening Enterprise Security

Speaking with TechGraph, Ankit Sharma, Senior Director and Head of Solutions Engineering at Cyble, discussed how security teams today face an overwhelming volume of...

Jaguar Land Rover’s £2 Billion Cyber Lesson: Why a Phone Call Is More Dangerous Than Malware

Factories halted. Dealers idle. Suppliers unpaid. In September 2025, Jaguar Land Rover (JLR), one of the world’s most admired automakers, was forced to hit...

Cyber Insurance Gaps: Why Indian Businesses Discover Their Risks Too Late

The increasing frequency and severity of cyberattacks have made cyber insurance an essential component of risk management for businesses worldwide. However, despite the growing...

Ethical Concerns in Deploying Agentic AI for Cybersecurity

Imagine that it's 3 AM and your company's AI security system just blocked what it thought was a sophisticated attack. No human intervention was...

Data Diodes: Using Physics to Stop Trojan Horses at the Gate

Data diodes are the ultimate jugaad solution in the world of high-tech cybersecurity. The term jugaad, rooted in the Indian ethos of innovative, frugal,...

Shopper’s Anxiety in the Age of OTP Scams

As online scams make it to the news headlines every day, the fear of falling prey to this exploitation is very real. Digital transactions...

Passwordless Authentication Firm 1Kosmos Secures $57 Mn in Series B round

1Kosmos, a company that unifies identity proofing and passwordless authentication, has raised $57 million in Series B funding, including a $10 million line of...

How Proactive Threat Intelligence Prevents Fraud Before It Starts

The threat landscape of cybercrime is changing at a faster rate than a chameleon changes its color. But defensive tactics? Well, it takes a...

How is AI being used to detect unusual customer behavior & fraudulent transactions in real-time?

In an era of hyper-digital transactions and global commerce, it has been more difficult to detect fraud. Traditional rule-based systems simply cannot keep up...

Why Every Organization Should Implement Extended Detection and Response (XDR)

Extended Detection and Response (XDR) solutions have radically changed the cybersecurity industry over the last several years. No longer able to breach under-secured endpoints...

Why data breaches are getting costlier in India

A data breach occurs when unauthorized individuals gain access to confidential or sensitive information, compromising the integrity and security of an individual or a...

Cybersecurity Theater: Why Companies Still Fall for the Illusion of Control

The world now experiences daily security breaches on evening news while ransomware groups operate like major Fortune 500 companies yet enterprises seem to be...

Beyond Firewalls: How Threat Intelligence Platforms Are Transforming Cybersecurity Operations

“Cybersecurity isn't just about building walls—it’s about seeing the enemy before they strike.” In today’s evolving digital landscape, firewalls and antivirus software no longer...

Top Cybersecurity Practices for Small Businesses: Why a VPN is a Must-Have

In today's hyperconnected world, small businesses face a growing number of cybersecurity threats that can cripple operations and erode customer trust. From phishing attacks...

The Importance of Zero-Trust Security Models in Safeguarding Data

In an age where cyberattacks grow more sophisticated by the day, traditional security models are no longer enough to safeguard sensitive data. The zero-trust...

Indusface Launches CyberShiksha program to Educate Students on Cybersecurity

Indusface, a leading application security provider for SaaS solutions, has launched CyberShiksha, a national initiative to improve cybersecurity awareness among students. India has emerged as...

Don’t Let Your Identity Get Stolen

Identity theft is getting more common. Thirty-three percent of Americans have already been victims. You don’t want to join them if you can help...

Ensuring Data Privacy in a Connected World: Security Measures in Tech SaaS Platforms

In an era of ever-expanding digital interconnectivity, the indispensability of Software as a Service (SaaS) platforms to both individuals and businesses cannot be overstated....

Managing Cyber Risk in an Evolving Risk Landscape

Most people think of cyber risk as potential harm from a company's IT and communications systems. This narrow view is because businesses report data...

Interview: Shailendra Shyam Sahasrabudhe Of Cymulate On Role Of Technology & Cybersecurity in business

On Tuesday Evening, Shailendra Shyam Sahasrabudhe, Country Manager, India UAE, and South East Asia at Cymulate sat down with the TechGraph editorial team for...

Data Security Threats: All You Need To Know

In today's rapidly evolving digital landscape, data security has become a crucial component of any organization's strategy. The increasing reliance on data to drive...

Indian Healthcare Faced Enormous Cyber Attacks in 2022, Till Nov: CyberPeace Foundation and Autobot Infosec Report

Cyber attacks on healthcare facilities have been rising in recent years, and the pandemic has only worsened matters. With hospitals and other healthcare facilities...

Chitkara University Signs MoA with Data Security Council of India to Collaborate for Joint Programs on Cyber Security and Privacy

Chitkara University has signed a Memorandum of Association (MoA) with the Data Security Council of India (DSCI) - National Centre of Excellence for Cyber...

National Commission for Women Launches 4th Phase of Digital Shakti with CyberPeace Foundation, Meta and Autobot Infosec

National Commission for Women launched the fourth phase of Digital Shakti Campaign, a pan-India project on digitally empowering and upskilling women and girls in...

Addressing an Ecological Fallacy: Does Lower Digital Access in Rural India Result in Minimal Cases of Cyber Abuse

The National Commission for the Protection of Child Rights' (NCPCR) Chairperson Shri Priyank Kanoongo launched a report titled, "Changing Trends in Online Abuse and...
spot_img

Trending

THE SNAPSHOTS

Sign up to get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.