After US findings showed proof of China cyberattack on Indian servers, the national cybersecurity Gen alluded that incipient policies on cybersecurity are being orchestrated. India is mulling a pristinely incipient countrywide approach to bolster the country’s cybersecurity amid allegations that Chinese intrusions may additionally have affected operations at a key inventory trade and distribution of energy with inside the country’s business capital. The current cyber threat poses paramount challenges due to expeditious technological advancements such as Cloud Computing, Artificial Astuteness, 5G, etc.

Former Lieutenant General Rajesh Pant, India’s National Cyber Security Coordinator verbally expressed the breaches were likely malware and couldn’t be relegated as attacks without an opportune investigation.

“Maleficent domains and websites to the tune of around 5,000 were registered in a short span of time. An additional incrimination of 500% in cybercrime has been witnessed, owing to people’s inhibited vigilance and poor cyber hygiene. Financial frauds have additionally incremented tremendously owing to the incremented reliance on digital payment platforms,” said Mr. Doval who also drew attention to how a number of prominent UPI IDs and web portals were forged while fake Arogya Setu apps propped up to exploit people’s data just hours after the Prime Minister declared the launch of the PM Cares fund.

Lt. General Rajesh Pant reiterated that the much awaited Strategy is in the final stages of approval, and will deal with subjects such as indigenization of technology and decentralization of cybersecurity responsibilities. It is also expected to have provisions for funding cybersecurity work. The strategy will be approved by the cabinet committee on security headed by Prime Minister Narendra Modi.

India’s cyber security landscape is going through an interesting phase, we look forward to being a part of the CyberSecurity’s Future.

  • Cyber security
  • Cyber security laws
  • esof by tac security
  • Indian cyber security
  • Law
  • Rajesh Pant
  • TAC Security
  • Vulnerability
  • Vulnerability Management