India's Budget 2025-26 Coverage
Presented by:
spot_img

Topics: Cyber crime

Why Do Cyber Criminals Target Human Psychology, and How Can We Outsmart Them?

In previous decades, the primary efforts of cybersecurity have centered around the construction of digital barriers, such as firewalls, antivirus systems, and intricate encryption....

Redefining Cyber Defense: Ankit Sharma on How Cyble AI Is Strengthening Enterprise Security

Speaking with TechGraph, Ankit Sharma, Senior Director and Head of Solutions Engineering at Cyble, discussed how security teams today face an overwhelming volume of...

Jaguar Land Rover’s £2 Billion Cyber Lesson: Why a Phone Call Is More Dangerous Than Malware

Factories halted. Dealers idle. Suppliers unpaid. In September 2025, Jaguar Land Rover (JLR), one of the world’s most admired automakers, was forced to hit...

Cyber Insurance Gaps: Why Indian Businesses Discover Their Risks Too Late

The increasing frequency and severity of cyberattacks have made cyber insurance an essential component of risk management for businesses worldwide. However, despite the growing...

Ethical Concerns in Deploying Agentic AI for Cybersecurity

Imagine that it's 3 AM and your company's AI security system just blocked what it thought was a sophisticated attack. No human intervention was...

Weaponizing Trust: How Threat Actors Use GenAI and Deepfakes to Breach Digital Security

On an April afternoon, Sarah was scrolling Instagram as she came across a familiar face. The video featured Peter Hargreaves the co-founder of UK’s...

Data Diodes: Using Physics to Stop Trojan Horses at the Gate

Data diodes are the ultimate jugaad solution in the world of high-tech cybersecurity. The term jugaad, rooted in the Indian ethos of innovative, frugal,...

Shopper’s Anxiety in the Age of OTP Scams

As online scams make it to the news headlines every day, the fear of falling prey to this exploitation is very real. Digital transactions...

Why data breaches are getting costlier in India

A data breach occurs when unauthorized individuals gain access to confidential or sensitive information, compromising the integrity and security of an individual or a...

Cybersecurity Theater: Why Companies Still Fall for the Illusion of Control

The world now experiences daily security breaches on evening news while ransomware groups operate like major Fortune 500 companies yet enterprises seem to be...

The Importance of Zero-Trust Security Models in Safeguarding Data

In an age where cyberattacks grow more sophisticated by the day, traditional security models are no longer enough to safeguard sensitive data. The zero-trust...

Indusface Launches CyberShiksha program to Educate Students on Cybersecurity

Indusface, a leading application security provider for SaaS solutions, has launched CyberShiksha, a national initiative to improve cybersecurity awareness among students. India has emerged as...

The Role of Behavioral Biometrics in Online Fraud Protection

The modern-day hacker has an almost unlimited repertoire of potential attack vectors to choose from when aiming to steal financial or private information from...

Don’t Get Hacked: Why Is Cyber Security So Important To Businesses?

In the wild, a brightly colored bird with no natural defenses becomes easy prey. In the digital jungle, businesses with weak cyber security are...

Don’t Let Your Identity Get Stolen

Identity theft is getting more common. Thirty-three percent of Americans have already been victims. You don’t want to join them if you can help...

Securing Credentials: Dhiway CTO & Founder Satish Mohan On How MARK Studio Uses Blockchain To Transform Credentialing

In an interview with TechGraph, Satish Mohan, Founder & CTO of Dhiway discusses how its blockchain-based MARK Studio platform secures business through efficient digital credentials...

Skyrocket to Cloud Nine: Why Embracing Cloud Migration is Crucial for Business Growth?

Migrating to the cloud can significantly boost the proactive and reactive competencies of firms while helping them align more effectively with fast-changing business environments. Cloud...

Data Security Threats: All You Need To Know

In today's rapidly evolving digital landscape, data security has become a crucial component of any organization's strategy. The increasing reliance on data to drive...

Future of Cloud-Native Application Protection Platform

Cloud-native Application Protection Platform (CNAPP) offers a complete security solution, and by helping security and DevOps teams to collaborate effectively, it aids in the...

Toyota Kirloskar Motor’s system breached

India-based automaker giant Toyota Kirloskar Motor on Sunday said, "It has reported a data breach in its system." The company said in a statement, "It...

Indian Healthcare Faced Enormous Cyber Attacks in 2022, Till Nov: CyberPeace Foundation and Autobot Infosec Report

Cyber attacks on healthcare facilities have been rising in recent years, and the pandemic has only worsened matters. With hospitals and other healthcare facilities...

Chitkara University Signs MoA with Data Security Council of India to Collaborate for Joint Programs on Cyber Security and Privacy

Chitkara University has signed a Memorandum of Association (MoA) with the Data Security Council of India (DSCI) - National Centre of Excellence for Cyber...

National Commission for Women Launches 4th Phase of Digital Shakti with CyberPeace Foundation, Meta and Autobot Infosec

National Commission for Women launched the fourth phase of Digital Shakti Campaign, a pan-India project on digitally empowering and upskilling women and girls in...

Addressing an Ecological Fallacy: Does Lower Digital Access in Rural India Result in Minimal Cases of Cyber Abuse

The National Commission for the Protection of Child Rights' (NCPCR) Chairperson Shri Priyank Kanoongo launched a report titled, "Changing Trends in Online Abuse and...

Austrade Education and Future Skills Initiatives and Australia-India Cybersecurity Hackathon Challenge Launched at AIBX 2022 Business Mission Event in Bengaluru

As a part of the AIBX 2022 Business Mission, the Australian Trade and Investment Commission (Austrade) launched future skills initiatives, the Australia-India Cybersecurity Hackathon...

Research Report on the Scams in Names of Indian Railway and Big Brands in India released

WhatsApp messages masquerading as the offers from various giant entities with links luring unsuspecting users with the promise of transport subsidy, medical subsidy, recharge...

MetricStream Enhances Cloud Security and Compliance with Continuous Control Monitoring on AWS, Enabling a Proactive Response to Threats and Vulnerabilities

MetricStream, the global market leader of integrated risk management (IRM) and governance, risk, and compliance (GRC), today announced MetricStream CyberGRC works with AWS Security...

Cyber Risks are Lurking Around Every Corner of the Digital World: Raghnall Launches ‘Individual Cyber Insurance’ to Keep your Fears at Bay

Navigating the digital world reveals all the infinite possibilities that the powers of the Internet can accomplish for us. From searching for information online,...

Governor of Jharkhand Launches Ranchi University-IETE-CyberPeace – Center of Excellence (CoE)

Research in Cyber domain, Diploma courses on CyberSecurity and CyberSecurity Entrepreneurship will now be available on the premises of Ranchi University, Jharkhand. To promote...

Grant Thornton Bharat Acts as Exclusive Advisor to C3M on its Acquisition by CyberArk

Grant Thornton Bharat led the recently concluded sale of C3M, an emerging multi-cloud cybersecurity firm, to CyberArk, a NASDAQ listed global leader in Identity...

Trending

THE SNAPSHOTS

Sign up to get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.