Sign in to view Akshay’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Akshay Tiwari
India
14K followers
500+ connections
View mutual connections with Akshay
Akshay can introduce you to 10+ people at Cyderes
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Akshay
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Articles by Akshay
-
Different DATA Backup Strategies , Focused on CISSP
Different DATA Backup Strategies , Focused on CISSP
"Organizations should have a backup strategy for several reasons, such as Data Loss Prevention, Business Continuity…
10
1 Comment -
SOC and AI - (The SOCeye)Sep 26, 2023
SOC and AI - (The SOCeye)
As technology continues to evolve, so do the methods and capabilities of cyber threats. To combat these ever-evolving…
21
-
Ransomware Incident and the role of SOCSep 25, 2023
Ransomware Incident and the role of SOC
Ransomware attacks continue to plague organizations worldwide, demanding more technical and strategic defenses. In this…
19
-
SIEM queries - Your Log Analysis allySep 23, 2023
SIEM queries - Your Log Analysis ally
In the ever-evolving landscape of cybersecurity, Security Information and Event Management (SIEM) systems stand as the…
19
1 Comment -
Windows Registry and its Forensic significance - Part 3Sep 21, 2023
Windows Registry and its Forensic significance - Part 3
The Windows Registry serves as the heartbeat of a Windows operating system, housing a hierarchical database of…
17
1 Comment -
Windows Registry and its Forensic significance - Part 2Sep 13, 2023
Windows Registry and its Forensic significance - Part 2
Welcome to the second installment of our three-part series on Windows Registry and its forensics Significance. In the…
13
-
Windows Registry and its Forensic significance - Part 1Sep 8, 2023
Windows Registry and its Forensic significance - Part 1
What are Windows Registries? The Windows Registry is a critical component of the Windows operating system, serving as a…
17
-
Investigating SIEM Use Cases: A Pragmatic ApproachSep 6, 2023
Investigating SIEM Use Cases: A Pragmatic Approach
When working in roles related to Security Operations Centers (SOC), Security Analysts, or Level 2 (L2) positions, one…
15
-
Unlocking the Power of Windows Event IDs: Creating Effective Splunk RulesSep 3, 2023
Unlocking the Power of Windows Event IDs: Creating Effective Splunk Rules
In the dynamic world of cybersecurity, being proactive is key to safeguarding your organization's digital assets. One…
21
2 Comments -
Understanding Phishing and Email Header AnalysisSep 1, 2023
Understanding Phishing and Email Header Analysis
What is Phishing? Phishing emails are a common method used by cybercriminals to gain unauthorized access to sensitive…
16
Activity
14K followers
-
Akshay Tiwari posted thisSOC Alert: Axios npm Supply Chain Attack (2026) A widely used JavaScript library (Axios) has been compromised via npm, delivering a cross-platform Remote Access Trojan (RAT). This is not just another malware alert — this is a software supply chain attack impacting developers, CI/CD pipelines, and production environments. What Happened (High-Level) Threat actor compromised an npm maintainer account Published malicious versions: [email protected] and [email protected] Injected a malicious dependency: plain-crypto-js Triggered via npm install → postinstall script executes automatically Result: Silent RAT deployment across Windows, Linux, and macOS Attack Flow (Simple View) 1. Developer or CI/CD pipeline runs npm install 2. Malicious package executes postinstall script 3. Script spawns system-level processes (PowerShell / bash / python) 4. Payload executes (file-based or fileless) 5. Endpoint initiates outbound connection (commonly port 8000) 6. Attacker gains remote access. --- How SOC Teams Can Detect This 🔹 SIEM (Chronicle / Splunk / Sentinel) Look for npm install execution logs Monitor DNS requests to suspicious domains Hunt outbound traffic on uncommon ports (e.g., 8000) 🔹 EDR (CrowdStrike / SentinelOne) Watch for: npm or node spawning PowerShell / bash / python Identify: Suspicious child processes File drops (e.g., wt.exe, /tmp/ld.py) Short-lived execution chains 🔹 Golden Detection Chain npm install → script execution → abnormal process → outbound connection --- How to Secure CI/CD Pipelines Enforce strict version pinning (avoid auto-updates) Use dependency scanning tools (Snyk, Socket, etc.) Monitor or disable postinstall scripts Use isolated / ephemeral build environments Rotate all secrets: npm tokens, API keys, SSH keys --- Reality Check for Security Teams Most organizations will miss this because: No visibility into developer activity No logging of npm/package installs Over-reliance on traditional IOC-based detection If you’re not monitoring your build pipeline, you’re already at risk. --- Final Takeaway Supply chain attacks are evolving fast. Detection must shift from: IOC-based → Behavior-driven + pipeline security --- #CyberSecurity #ThreatHunting #SOC #SupplyChainSecurity #npm #Axios #EDR #SIEM #DevSecOps #IncidentResponse
-
Akshay Tiwari posted thisSOC Analysts — AI Agents Are Becoming the Next Attack Surface (OpenClaw Case Study) Recently multiple Researchers, Products organisation highlighted risks associated with AI agents.Openclaw being the most highlighted.This being a case study let's understand how AI agents can be another attack surface to monitor. AI “super agents” like OpenClaw are rapidly entering enterprise environments. While they boost productivity, they also introduce new security risks SOC teams cannot ignore. Here are the key threats analysts should start tracking: AI Agents as Potential Backdoors Many AI agents run locally with broad access to files, terminals, APIs, and sometimes root privileges. If misconfigured or exposed, they can be hijacked by adversaries and effectively become an automated insider threat. Prompt Injection = Data Exfiltration Risk Attackers can manipulate AI agents using malicious prompts or hidden instructions in emails, documents, or web content. This can result in: • Sensitive data leaks • Unauthorized command execution • Reconnaissance and lateral movement via the agent’s access Indirect Prompt Injection — The Silent Threat Unlike traditional attacks, adversaries may never interact directly with the AI. Instead they poison data sources the agent consumes, causing it to execute attacker instructions unknowingly. This blurs the boundary between trusted data and malicious control signals. Internet-Exposed AI Instances Some deployments have already been observed exposed externally, sometimes over unencrypted connections — creating interception and unauthorized access risks. Agentic Blast Radius Compromised AI agents don’t just leak data — they can: • Execute chained actions across systems • Abuse legitimate API/database access • Automate attacker objectives at machine speed SOC Takeaway: AI agents are not just tools anymore — they’re potential identities, automation engines, and attack surfaces combined. Detection strategies must evolve beyond malware to include: ✔ AI usage visibility ✔ Prompt-level threat hunting ✔ Monitoring AI-driven automation paths ✔ Governance around AI agent deployment #SOC #CyberSecurity #ThreatHunting #AIsecurity #PromptInjection #BlueTeam #SecurityOperations #GenAI #CyberDefense
-
Akshay Tiwari posted this𝐀𝐭𝐭𝐞𝐧𝐭𝐢𝐨𝐧 𝐒𝐎𝐂 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 - 𝐋𝐚𝐭𝐞𝐬𝐭 𝐓𝐡𝐫𝐞𝐚𝐭 𝐀𝐥𝐞𝐫𝐭 𝐍𝐨𝐭𝐞𝐩𝐚𝐝++ Rapid7 recently published a deep dive on the Chrysalis backdoor, attributed to the Lotus Blossom APT. The campaign abused a trusted software update path (Notepad++) to deliver a multi-stage, memory-resident backdoor. From a SOC perspective, the attack flow is worth studying: Initial access Attackers compromised the update infrastructure, redirecting users to a malicious installer. What looked like a legitimate update became the initial execution vector. Execution & defense evasion The installer dropped a legitimate binary and a malicious DLL to perform DLL side-loading. The payload decrypted shellcode in memory, used API hashing, and avoided traditional static detection. Command and control Once active, the Chrysalis backdoor established encrypted C2 and supported command execution, file operations, and interactive access. Follow-on activity blended custom malware with commodity frameworks like Cobalt Strike. Why this matters for SOC teams: • Trusted software can still be the entry point • DLL side-loading continues to be a reliable attacker technique • Memory-only execution reduces disk-based indicators • Supply-chain attacks often bypass perimeter controls entirely What SOC analysts should hunt for: • Update or installer processes spawning from unusual paths • Legitimate binaries loading DLLs from user-writable directories • Encrypted outbound traffic from software that normally shouldn’t beacon • Persistence via unexpected services or Run keys tied to “trusted” apps Detection needs to move beyond “is the file malicious?” to “does this behavior make sense?” If you’re in a SOC, this is a good case study to re-evaluate how you monitor installers, updaters, and DLL loading behavior. #SOC #ThreatHunting #MalwareAnalysis #APT #DetectionEngineering #IncidentResponse #CyberSecurity
-
Akshay Tiwari shared this𝐒𝐎𝐂 𝐇𝐢𝐫𝐢𝐧𝐠 𝐀𝐥𝐞𝐫𝐭 We are expanding our team and looking for 𝐒𝐩𝐥𝐮𝐧𝐤 𝐩𝐨𝐰𝐞𝐫 𝐮𝐬𝐞𝐫 certified SOC analysts along with EDR experience. Location - Bangalore(Hybrid) Exp - 2 to 4yrs Apply directly - https://lnkd.in/dHy_NP4N
-
Akshay Tiwari posted this🔒 We’re Hiring: SOC Analysts 🔒 Are you passionate about defending organizations against cyber threats? Do you want to join a team that lives by values like Trailblazing, Reliability & Respect, Unity, Service-Obsessed, and Tireless drive? If yes — we want to meet you at Cyderes What You’ll Do: Monitor security alerts and logs in real time from firewalls, endpoints, SIEMs (e.g. Microsoft Sentinel / Zscaler, Splunk, etc.). Investigate suspicious events, triage incidents, and escalate to Incident Response as needed. Perform root-cause analysis of security events and document findings with clear remediation steps. What We’re Looking For: Prior experience in a 24×7 Security Operations Center (SOC) or Incident Monitoring role. Good understanding of log management, threat detection, and triage — especially in mail, network, and endpoint telemetry. Familiarity with common alerting frameworks (e.g. MITRE ATT&CK) What You’ll Get: Opportunity to work with seasoned security professionals. Exposure to enterprise-grade tools and real-world threat scenarios — a great place to learn, grow, and fast-track your career in Incident Response / Threat Hunting. A collaborative, value-driven culture. Competitive compensation. DM or Apply directly https://lnkd.in/dSis3ehD ✨ Feel free to share this post — you might help someone take their first step into a meaningful SOC career!
-
Akshay Tiwari posted thisAWS Outage: Lessons for Security and IT Teams The recent AWS us-east-1 outage was a reminder that even the most reliable cloud platforms can fail in unexpected ways. It wasn’t just an AWS problem — it’s a learning opportunity for every organization running critical services in the cloud. - What happened A failure in the DNS update process led to key AWS services losing connectivity. Because many internal systems depend on DynamoDB and related components, the issue cascaded across EC2, networking, and authentication systems. Recovery took several hours as dependencies stabilized and network changes propagated. - Key lessons for security and IT professionals Cloud reliability isn’t guaranteed. Even a small DNS or database issue can create wide-scale outages. Dependencies can amplify impact. A single failure in a core service can ripple across monitoring, authentication, and response systems. Visibility is everything. If your logging, SIEM, or identity services fail, you may temporarily lose the ability to detect or respond to threats. Plan for partial recovery. Outages rarely resolve instantly — some systems will recover faster than others. Communication is part of incident response. During any large outage, clear internal updates build trust and reduce panic. Design for resilience. Multi-region and fallback designs help ensure critical functions like monitoring, authentication, and response remain available. - Action steps Map out dependencies in your SOC and IT stack — especially what breaks if a single service goes down. Test how your systems behave when key endpoints (like DNS or APIs) become unreachable. Ensure recovery plans include log storage, telemetry, and response tools. Simulate a regional outage and see how long it takes to restore full visibility and operations. Review communication protocols — who updates leadership, how often, and through which channels. Cloud outages will continue to happen. What defines resilient organizations is how they prepare, communicate, and recover when they do. #CloudSecurity #IncidentResponse #SOC #Resilience #ITOperations #CyberSecurity #AWS
-
Akshay Tiwari posted this!AI-SOC adoption! From buzzword to boardroom priority, AI-SOC adoption is accelerating as organizations seek faster detection, smarter triage, and automated response. From raw telemetry to automated containment — here’s a step-by-step view of an AI-powered SOC and how to build it in practice. 1) Ingest & Normalize Collect telemetry from endpoints, network, cloud, email, identity and business apps. ETL/parsers standardize events so downstream systems speak the same language. 2) Store & Enrich Index events in a searchable data lake / observability store and enrich with asset context, vulnerability data and threat intel (IP reputation, indicators). 3) Detect (AI + Rules) Combine detection engineering (signatures & correlation rules) with ML: supervised classifiers, anomaly detection and graph analytics. Map detections to MITRE/ATT&CK to keep coverage intentional. 4) Prioritize & Score Score events by risk (impact × likelihood) — this is the key decision point that separates events-of-interest from noisy alerts. Tune thresholds to balance precision vs recall. 5) Alerting & Triage (SOAR integration) Trigger SOAR playbooks for validated alerts: enrichment, IOC lookups, evidence collection and automatic ticket creation. Use playbooks to reduce repetitive work and contain simple incidents automatically. 6) Investigation (Human in the Loop) Analysts get a unified timeline, entity links and recommended hypotheses. Human validation handles edge cases, hunt-worthy activity, and complex decisioning. 7) Remediation & Orchestration Automated containment for high-confidence, low-risk actions; manual remediation for sensitive assets. Track MTTR and “REACT” (recognize → eradicate → confirm → teach). 8) Feedback & Continuous Learning Close the loop: label outcomes, feed them back to detection engineering and model retraining pipelines. Reduce false positives, improve recall, and evolve playbooks. 9) Governance & Observability Monitor data quality, model drift, fairness/explainability, and access controls. Maintain an audit trail for every automated action. Why this matters An AI-SOC isn’t “set it and forget it.” It’s a layered system: telemetry → enrichment → machine+rules → human judgement → automated remediation → learning loop. Each decision point should have clear SLAs, rollback paths, and observability. #AI #Cybersecurity #SOC #SIEM #SOAR #MLOps #ThreatDetection
-
Akshay Tiwari posted this!!Free Microsoft Security Learning Hub!! Microsoft has launched an easy-to-use, single-page Security Academy designed for anyone looking to build or strengthen their Microsoft Security skills—for free. https://lnkd.in/e7bRXaFm What makes this valuable for SOC analysts and security teams: Free access to curated Microsoft Security content Role-based learning paths for SOC Analyst, Threat Hunter, Compliance, IAM, and more Covers Microsoft Sentinel, Defender XDR, Entra ID, Intune, Purview, and other tools Includes Microsoft Learn modules, labs, certification prep, and documentation One simple, organized page—no searching, no sign-ins Whether you're getting started or looking to go deeper into Microsoft’s security stack, this hub is a great place to begin or grow.Share with your team and bookmark it for continuous learning. #MicrosoftSecurity #SOCAnalyst #Sentinel #DefenderXDR #ThreatHunting #CyberSecurity #BlueTeam #MicrosoftLearn #CloudSecurity #FreeTraining #SecurityOperations #IncidentResponse
-
Akshay Tiwari posted thisAttention AI Enthusiasts & Students! Whether you're diving into coding, building your first model, or exploring the boundaries of generative AI — here's something exciting for you. Google Gemini for Students - https://lnkd.in/dZaYGxUE is your new go-to learning companion! From brainstorming ideas to writing code and solving complex problems — Gemini is designed to help you learn faster, smarter, and more creatively. Perfect for: Computer Science & Engineering students AI/ML learners Anyone curious about how to harness AI for education, research, and real-world impact Let’s explore, build, and grow with AI. #AI #MachineLearning #Gemini #GoogleAI #Students #Coding #ArtificialIntelligence #TechForGood #LearningWithAI #FutureOfWork
-
Akshay Tiwari liked thisAkshay Tiwari liked this🔴 This is what a $300K SOC replacement looks like 🔴 A while ago I started asking: what if a small team could monitor infrastructure like a Fortune 500 — without the budget? This is where we are today: ⚡️ 35 autonomous security agents running 24/7 📊 Real-time CVE feeds — NVD + EPSS exploit probability scoring 🎯 MITRE ATT&CK mapping across all security failures 🛡️ Wazuh SIEM + custom Grafana threat intelligence dashboards 🔴 Live threat actor tracking — Akira, TeamPCP, ShinyHunters 💰 Costs???: less than €1,000/month Not a demo. Not a concept. Production. The hardest part wasn't the tech. It was learning that clarity beats complexity. Every dashboard, every alert, every agent should answer one question: what do I do right now? SEE IT LIVE → https://lnkd.in/dYPyEzKY We're building TIA — autonomous AI security for teams that can't afford a full SOC. If you're a startup, MSP, or solo engineer flying blind on security — let's talk. #cybersecurity #StatefulAI #SOC #threatintelligence #NIS2 #SIEM #infosec
-
Akshay Tiwari reacted on thisExcited to share that I will be speaking with the DEF CON Chennai Group. Looking forward to discussing our latest research, meeting the community, and exchanging ideas with others working in security and threat research. Grateful for the opportunity to be part of it. #cyderes #howlercellAkshay Tiwari reacted on thisHey Hackers, DEF CON Chennai DCG9144: Main Event 0x1 (Core Dump) | Speaker Sploit 0x5 Disk is monitored. Memory is trusted. That’s where the mistake begins. Fileless isn’t stealth. It’s strategy. This session breaks down how modern adversaries weaponize Node.js to deploy fileless RATs - executing in-memory, blending into trusted runtimes, and evading traditional detection. Join Reegun Richard Jayapaul as he dissects real-world tradecraft behind Node.js abuse - turning legitimate environments into covert command channels Boot up for "Modern Fileless RAT Tactics: Node.js Abuse : Technical Analysis" - where execution leaves no trace… and control lives in memory. Operational Brief: Venue: Zoho Corporation, Chennai Date: April 4th & 5th, 2026 Time: 09:00 AM - 05:00 PM IST Registration Link: https://lnkd.in/dMkJN3Cy If it writes to disk, it’s already too loud. #defcon #dcg9144 #defconchennai #infosec #hacking
-
Akshay Tiwari reacted on thisAkshay Tiwari reacted on thisI’m happy to share that I’ve obtained a new certification: Automation Practitioner from Torq! #TorqCertified
-
Akshay Tiwari reacted on thisAkshay Tiwari reacted on thisThrilled to be part of this exciting new chapter for Cyderes with the launch of our new office and Security Operations Center in Bangalore. Honored to see Chris Schueler mark the opening of the new office and CCO Richard R. (Rick) Miller lead the launch of the new SOC. 🚀 #Cyderes #cyderesIndia #LifeatCyderes
-
Akshay Tiwari liked thisAkshay Tiwari liked thisWe’re growing our Security Operations team and are looking to add strong Tier 2 and Tier 3 SOC Analyst. If you’re passionate about threat detection, incident response, colaborating with great people and making real impact, let's talk! We are looking for people based out of Vancouver or Seattle. Senior Security Analyst (Tier 3) Seattle: https://lnkd.in/dtbXCrgR Vancouver: https://lnkd.in/d_sj_PKi Security Analyst (Tier 2) Seattle: https://lnkd.in/d4b7myAz Vancouver: https://lnkd.in/dk4svhn4 Feel free to reach out if you have any questions or need additional information about the roles.
-
Akshay Tiwari reacted on thisAkshay Tiwari reacted on thisCyderes is now in Bengaluru, and the India team, led by Bhaskar Nagasai D, made sure we felt it from the moment we arrived. Badminton tournaments, live drums, dancing. The opening ceremony captured the culture this team has built and the energy they bring to the work every single day. Walking through that space and seeing the people behind our global operations reinforced something I already knew: this team doesn't support Cyderes from a distance. They are Cyderes. Around the clock, across time zones, through every client escalation and threat response, the Bengaluru team is a core part of how we deliver. That doesn't happen without the right people, and the right people showed up in a big way this week. Richard R. (Rick) Miller and I were glad to be there for it. Grateful for this team and excited for everything ahead.
Experience & Education
-
Cyderes
*** *******
-
******** *****
******** *******
-
******
******* *** ******** ********
-
************ ***** ********** ********* **********
** *********** *** ***************** undefined
-
View Akshay’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
-
Certified Information Systems Security Professional (CISSP)
(ISC)²
Issued ExpiresCredential ID https://www.credly.com/badges/a0256ec0-ce88-4c02-a69d-a081c73a9cc8/public_url
View Akshay’s full profile
-
See who you know in common
-
Get introduced
-
Contact Akshay directly
Other similar profiles
Explore more posts
-
Rahul Kumar
Howell Protection Systems… • 2K followers
🚨 A Major Regulatory Shift Is Just Around the Corner for India's Surveillance Industry. #Cybersecurity #CCTV #Surveillance #MeitY #STQC #BISCertification #EssentialRequirements #IndiaCompliance #SmartSecurity #NationalSecurity #MakeInIndia #PhysicalSecurity #DataProtection #SecurityTechnology #RegulatoryCompliance #April2026 #SurveillanceTechnology #InfoSec #IoTSecurity #DigitalIndia
23
-
CISO FORUM
6K followers
“Alert fatigue in Security Operation Centers (SOC) is driven primarily by three intertwined factors, creating a crisis of operational burnout.” — Manikandan Thangaraj, Vice President of Engineering, ManageEngine In his exclusive CISO FORUM interview, Manikandan Thangaraj explains why over 80% of alerts being false positives is unsustainable — and how precision-engineered detection, identity-centric monitoring, and AI-driven augmentation can transform SOCs from firefighting units into strategic business enablers. Read the full interview 👉 https://lnkd.in/gs9xUEZ7 #Cybersecurity #SOC #AI #ThreatDetection #SecurityOperations #CISOInsights Vikas Gupta | Sachin Mhashilkar | Vandana Chauhan | Giridhar Rajagopalan | Jatinder S. | Hafeez Shaikh | Rajiv Pathak | Sourabh Dixit | Subhadeep Sen | Jagrati Rakheja | Musharrat Shahin | Aanchal G.
7
-
Urbego Services India Private Limited
436 followers
Threat Hunting in 2025: Moving Beyond Alerts In today’s complex cyber landscape, waiting for alerts isn’t enough. Threat hunting is about proactively searching for signs of compromise, identifying patterns attackers leave behind, and stopping incidents before they escalate. At Urbego Services India Pvt Ltd, we believe modern security analysts need to: 1. Hunt for anomalies across endpoints, networks, and cloud. 2. Correlate findings with threat intelligence for sharper insights. 3. Automate repetitive detection tasks while focusing on advanced threats. 4. Continuously refine hunting playbooks to stay ahead of attackers. Proactive hunting transforms security from reactive defense to predictive resilience. Because the best defense is knowing where attackers might strike next. #ThreatHunting #Cybersecurity #SOC #SecurityAnalyst #IncidentResponse #UrbegoServicesIndiaPrivateLimited
6
-
Peeyush Trivedi
Confidential Cybersecurity… • 4K followers
A CIO in Pune told me his NAC was "working." I asked to see the dashboard. What I found: → 847 devices discovered → 0 devices profiled → Enforcement: Disabled → Last policy update: 14 months ago "Working" meant: no alerts, no complaints. Not: secured, enforced, operational. The NAC was technically running. It just wasn't doing anything. When I asked who owned the system: → Network team: "Security bought it" → Security team: "Network should manage it" → Vendor: "We delivered what was scoped" Classic ownership vacuum. ₹22 lakhs spent. 11 months since go-live. Zero security value. 3 weeks later: → Device profiling: 100% → Policies: Aligned to business units → Enforcement: Phased rollout started → Owner: Named. Accountable. Empowered. Same product. Different outcome. --- The difference between "working" and "securing" is one question: "Show me what it's actually doing." Who owns NAC at your organisation? Network? Security? "Both"? (That usually means nobody.) #NAC #cybersecurity #manufacturing #networksecurity #ownership
44
8 Comments -
Vinayak Waghmode
DefensaNet Securities LLP • 4K followers
Sacrificing Cybersecurity Quality for Cost? A Wake-Up Call on CERT-In Empanelled Audits In India, we have over 150 CERT-In empanelled vendors authorized to conduct security audits for government, PSU, BFSI, and critical infrastructure organizations. But here’s the uncomfortable truth: 🔻 Audit quality is deteriorating. 🔻 Reports are becoming templated, generic, and checkbox-driven. 🔻 Junior analysts are being deployed with minimal oversight. Why? The answer lies in a flawed procurement model — the L1 (lowest bidder) trap. 🎯 In the race to win contracts based on price alone, many organizations are forced to cut corners: • Using copy-paste reports • Skipping retesting • Ignoring contextual threat modeling • Focusing on “compliance” over “real risk mitigation” 📉 This is not just a vendor issue — it’s a systemic gap. Who ensures report quality? 👉 While CERT-In occasionally reviews vendor performance, the primary responsibility falls on the auditee (you and me). In critical sectors, regulators like RBI or NCIIPC may review samples, but there’s no consistent, formalized report QA mechanism today. ⸻ 💡 What Needs to Change? ✅ Move from L1 to QCBS (Quality + Cost Based Selection) ✅ Introduce standardized report formats and tool disclosures ✅ Build a feedback loop to rate vendor quality post-audit ✅ Encourage independent second-level reviews for high-risk environments ✅ Incentivize deep audits over fast audits ⸻ Cybersecurity is not a commodity. It’s a strategic national asset. Let’s not let the lowest cost dictate the lowest defense. #CyberSecurity #CERTIn #RiskManagement #CyberAudit #Governance #IndiaSecurity #Infosec #CISO #BFSI #CriticalInfrastructure #QCBS #AuditQuality #L1Trap #Empanelment
15
-
Hive Pro, Inc.
39K followers
Attack Report | Threat level : Red 🔴 Read more about this advisory : https://lnkd.in/dzaznKtY ➡️ APT36 sharpens its espionage tactics, targeting India amidst geopolitical tensions. ➡️ Crisis-themed phishing & cross-platform malware used in ruthless cyber campaigns ➡️ Cyber conflict ignites swiftly when national tensions erupt #CyberSecurity #ThreatAdvisory #APT36 #DDoS #geopolitical #HiveforceLabs #HivePro
5
-
Raksha Technologies
5K followers
Raksha Cyber Snapshot Brief | 11 January 2026 Today’s briefing covers critical vulnerabilities, active exploit campaigns, and key India-focused cyber risk updates every security leader should track. Stay informed. Stay resilient. 🔐 #CyberSecurity #ThreatIntelligence #InfoSec #RakshaTechnologies
3
-
thestrategist &
3K followers
We protect data with firewalls. But who protects human focus? Burnout is not a resilience issue. It is a design issue. K Srini Shefali Rao Rohit Anand Sriram Sadras Madhavi Sharma Ramakrishna Matta Payamul Hoda Simran A. Dr. Raj Kumar Jayapal Padma Luhana (Chief Business Officer) Bimal Vyas Sushant Bahukhandi, SHRM-SCP Harshita Malik Datta Shyama Durbha R V Deepti Richhariya @annapurna Sardar Narendra Sankar Reddy Dwarampudi @yusra Alam Sasidharreddy Kuluru Syed Shagufta Begum Sneha Sunil Mruthyunjay Rao baba althaf Shaik #26Degrees #HRTransformation #AttentionEconomy #WorkplaceDesign #TheStrategist #HRTransformation #AttentionEconomy #WorkplaceDesign
9
-
Yash Rajeshirke
Confidential • 10K followers
Most breaches do not happen because someone lacked tools. ⠀ They happen because someone ignored context. ⠀ Security is not about finding issues. ⠀ It is about understanding application. ⠀ How data flows. Where trust exists. What assumptions were made. ⠀ Tools show symptoms. ⠀ Thinking finds causes real issue ⠀ That is why experienced security engineers: ⠀ move deliberately Ask more questions Fix fewer things first ⠀ And mostly attackers target teams, that move fast without thinking. ⠀ #CyberSecurity #OffensiveSecurity #AppSec #SecurityMindset #RedTeam #InfoSec
3
-
IT Voice Media
9K followers
India Cyber Threat Report 2026 Uncovers Credential Theft Attempts on Indian IT Sector In India’s booming IT sector, where code repositories, client portals, and cloud consoles hold the keys to billion-dollar projects, one asset has become... To Read More: https://lnkd.in/gJmGaDCt Seqrite | Sangamesh S | Sudhanshu Tripathi | Atul Lohani | Samuel Sathyajith #CyberThreatReport #IndiaCyberSecurity #CredentialTheft #ITSecurity #CyberThreats #IndiaITSector #CyberAttack #SecurityReport #CyberDefense #CyberSecurityNews #IndiaCyberThreats #ITSectorSecurity
13
-
MailArmor AI
552 followers
In this new field guide, “Top 5 Emerging Phishing Threats in India & How Businesses Can Stop Them in 2025,” Subhajeet Naha (27+ years in enterprise security, now leading Protecte Technologies) breaks down: 👉 The 5 fastest-evolving phishing patterns hitting Indian businesses 👉 A 30-day, India-ready defense plan using DMARC, passkeys, vendor verification, and mailbox-native, post-delivery security If you’re a founder, CISO, or IT leader responsible for protecting UPI rails and Microsoft 365/Google Workspace, this is one article you can’t afford to skip. 👉 Read the full guide and see how to cut phishing risk in weeks, not quarters. 👉 See the comment section for the link. #emailprotection #phishing #mailarmorai
3
1 Comment -
Uroniyx Technologies Pvt Ltd
128 followers
How Uroniyx is addressing New Enemy of Cybersecurity Problem 1: Fragmented security tools create blind spots ➡️ India’s biggest vulnerability is the sprawl of disconnected tools that slow detection and response. ✅ Uroniyx Solution: CloudSecure Suite & SecureSDNet Suite provide one integrated, AI-driven, quantum-safe platform, replacing tool sprawl with unified visibility across cloud, network, and endpoints. Problem 2: AI is now powering cyberattacks ➡️ Attackers are exploiting AI to automate phishing, deepfakes, and intrusions at scale. ✅ Uroniyx Solution: AI Ops turns AI into your defensive co-pilot, delivering real-time anomaly detection, predictive analytics, and automated playbooks to neutralize threats faster than attackers can escalate. Problem 3: Multi-cloud & IoT complexity overwhelms legacy security ➡️ The shift to multi-cloud and billions of endpoints make old models unsustainable. ✅ Uroniyx Solution: NetFusion Suite & NetSphere (NaaS) simplify multi-cloud resilience, secure connectivity, and AI enabled Autonomous IT operations along with SLA-backed services for hybrid environments — built for the scale and speed of modern IT. Problem 4: Shortage of cybersecurity talent ➡️ India faces a talent gap; tools alone can’t bridge it. ✅ Uroniyx Solution: Advisory & Enablement Suite augments human teams with training, compliance enablement, and virtual CISO/CTO services, ensuring organizations have both the tech and the know-how to stay secure. Problem 5: Digital trust is non-negotiable ➡️ A single breach can erase years of digital progress. Trust is the foundation. ✅ Uroniyx Solution: Quantum-Safe Security (PQC /QKD) future-proofs sensitive data and transactions, ensuring trust today and resilience against tomorrow’s quantum threats. 👉 In short: Uroniyx replaces complexity with clarity, AI-powered chaos with AI-enabled resilience, and fragmented defences with an integrated platform that builds digital trust. www.uroniyx.com
2
-
International Security Journal (ISJ)
24K followers
Cybersecurity leader Rinki Sethi – ex-Twitter CISO and now CSO at Upwind – speaks with Assistant Editor, Eve Goode, about tech, leadership and her journey in the industry: https://loom.ly/V75NpF4 #Security #SecurityIndustry #GlobalSecurity #SecurityNews #Cybersecurity #Upwind
2
-
Indusface
18K followers
👉 The recent Press Trust of India (PTI) news highlights key cyberattack trends from Indusface’s State of #AppSec – H1 2025 Report. The findings show APIs have emerged as a major target, with vulnerability exploitation rising 13x and DDoS attacks on API hosts surging by 388%. The report also uncovers attack patterns across #Banking, #FinancialServices, #Insurance, #Healthcare, #Retail, #SMBs, and other sectors. See how AI is enhancing protection and enabling faster, more precise responses to threats in this coverage. Read the news here: (Link in comments) #CyberNews #CybersecurityNews #WebsiteSecurity #ApplicationSecurity #Cybersecurity #DDoSAttacks #CyberTrends #AppTrana #Indusface
21
1 Comment -
Dr. Jagannath Sahoo
Gujarat Fluorochemicals… • 16K followers
🔐 Tata Motors Data Leak: A 70 TB Wake-Up Call for Cybersecurity Most assume data breaches stem from sophisticated cyberattacks. But often, it's a simple misstep — like misconfigured cloud settings or hard-coded credentials — that opens the floodgates. Tata Motors reportedly faced a massive 70 terabyte data exposure, leaking customer details, fleet logs, invoices, and more. The root cause? Exposed cloud keys and overly permissive access controls. 💡 The real lesson: This wasn’t a hack — it was a preventable error. 🧠 Key takeaways for organizations: Audit cloud storage and repositories regularly. Avoid hard-coded credentials — use secret management tools. Rotate API keys and passwords periodically. Enforce least-privilege access controls. Monitor logs for unusual access or bulk data transfers. 🛡 For consumers: Even trusted brands can slip. Stay alert, enable account notifications, and treat data privacy like personal safety. Cybersecurity isn’t about fear — it’s about foresight. #TataMotors #DataBreach #CyberSecurity #CloudSecurity #DigitalAwareness #InfoSec
35
1 Comment -
Interlynk
714 followers
⚡ Interlynk expands platform with SEBI CSCRF Compliance ⚡ As India’s financial sector moves to meet CSCRF requirements, Interlynk helps regulated entities strengthen their cyber resilience through software supply chain transparency, signed SBOMs, and continuous vulnerability intelligence. With this update, financial organizations can generate and sign SBOMs for every build, track vulnerabilities in real time, manage third-party software risks, and produce audit-ready compliance artefacts aligned with SEBI’s framework. Interlynk is proud to extend its SBOM automation platform to help India’s financial ecosystem anticipate, withstand, and recover from cyber threats with confidence. Learn More : https://lnkd.in/giKJJWHa #SBOM #CyberResilience #SEBI #CSCRF #SupplyChainSecurity #Interlynk
6
-
Enterprise IT World
16K followers
5Tattva, a leading cybersecurity solutions provider, has officially been empanelled by the Indian Computer Emergency Response Team (CERT-In) as an Information Security Auditing Organization. This recognition places 5Tattva among a select list of entities authorized to conduct cybersecurity audits for government departments, public sector undertakings (PSUs), and critical infrastructure operators across India. “This empanelment is a proud moment for all of us at 5Tattva. It validates our deep technical capabilities and reinforces our mission to contribute to India’s growing cybersecurity landscape,” Atul Luthra, Co-Founder & Principal Consultant, 5Tattva and CEO of Zeroday Ops Learn more: https://lnkd.in/grjUsXi9 SK Mohapatra Sanjib Mohapatra
3
-
MitKat Advisory
36K followers
Amit Narayan - Partner, India & South Asia, Control Risks Speaking at MARS 2026, Amit Narayan examined how data protection, cyber risk, and technology-driven disruption are reshaping the role of security leaders. With India’s data protection regime now in force, he noted that practices once considered routine: physical access control, visitor management, incident response have become regulatory and reputational risks with board-level consequences. Narayan cautioned security leaders against trying to “own everything” in response to expanding technology risk. Instead, he argued for a focused role: strengthening foundational safeguards, ensuring breach readiness, and supporting legal, compliance, and technology teams through clear incident playbooks and response timelines. He also stressed that resilience is the enabling condition for innovation. Organisations that create stability through disciplined security governance and preparedness—allow business leaders to take calculated risks and grow with confidence. Narayan concluded that security leadership in 2026 will be defined not just by control, but by clarity, prioritisation, and the ability to support organisational trust. Missed the session? Watch the recording here: https://lnkd.in/danyr9Zp Register for MARS APAC 2026 (22nd Jan 2026): https://lnkd.in/dCzKZ_2Y Download MitKat Advisory’s India Risk Outlook 2026: https://lnkd.in/dfxtxrza Samrendra Pawan Sushil SANDEEP Bruce Farah Ranjeet Mitesh Mark Kunal Aparna Abhijit Ameya Manoj Inder Rachel Avijit Aatreya Anushka Shubham Mrunal John Prakash Paras Sharma Prashant Mehta Harshita Suryawanshi Saishh Nagesh Kadam
176
10 Comments
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Akshay Tiwari in India
-
Akshay Tiwari
New Delhi -
Akshay Tiwari
Pune District -
Akshay Tiwari
Mumbai -
Akshay Tiwari
Pune City -
Akshay Tiwari
Mumbai
777 others named Akshay Tiwari in India are on LinkedIn
See others named Akshay Tiwari