securitylinkindia

Tenable Empowers erex with Continuous Cybersecurity Protection, Eliminating Costly Outsourcing

Tenable®, Inc., the exposure management company, recently announced that erex Co., Ltd, a pioneer in renewable energy, has selected Tenable One to visualize risks beyond vulnerabilities, including misconfigurations, entitlement flaws, software weaknesses with confidence and maintain an environment ready to defend against cyberattacks. Previously, the company relied on third-party cybersecurity specialists to detect whether the latest security patches were in place and find misconfigurations of its externally facing websites. While these assessments were comprehensive and detailed, they were costly, time-consuming, and limited to major website overhauls. With Tenable One, we now have the ability to unify security visibility, insight and action across the attack surface to understand our risk exposure and prioritize remediation efforts. This enhances our security posture and allows us to respond to threats proactively Ashish GuptaInformation System Department, erex Co., Ltd. “With Tenable One, we now have the ability to unify security visibility, insight and action across the attack surface to understand our risk exposure and prioritize remediation efforts. This enhances our security posture and allows us to respond to threats proactively,” said Ashish Gupta, Information System Department, erex Co., Ltd. erex now has the technical and business context to distinguish which risk combinations constitute true exposure from a sea of noisy findings. The result is greater productivity from security teams and the ability to quickly generate summary reports that highlight critical and high-level issues for internal distribution. “Visibility and proactive security are critical for managing risk,” said Naoya Kishima, Country Manager at Tenable Japan, “We are proud to support erex in strengthening its cybersecurity defenses with Tenable One. By providing continuous threat exposure management (CTEM), Tenable One enables organizations to detect vulnerabilities in real-time and take decisive action before threats materialise.” Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Read More

Read More
Smart

Empowering Smart Mobility with Intelligent Indigenized Innovations

CP PLUS Showcases Futuristic AI-Powered Surveillance at Smart Mobility Expo 2025 At the Smart Mobility Expo 2025, CP PLUS once again proved its leadership in the security and surveillance industry, unveiling cutting-edge AI-powered solutions designed to make urban transportation safer, smarter, and more efficient. With the increasing complexity of traffic management, road safety, and public mobility, CP PLUS is spearheading the future with intelligent, indigenized innovations that seamlessly integrate AI, advanced analytics, and real-time monitoring into India’s mobility infrastructure. Urban mobility is evolving at an unprecedented pace, demanding solutions that go beyond conventional surveillance. CP PLUS showcased its latest breakthroughs in the Dashcam technology with its commitment to technological excellence and public safety. In the world of surveillance and safety, CP PLUS is redefining road monitoring with its CarKam Series, setting a new standard for dashcam technology. These devices are not just cameras; they are the eyes on the road, people’s partners in safety, and their companions on every journey. Adding to the event’s significance, M.A. Johar, President – Strategic Business at CP PLUS, took center stage to share his visionary insights on how AI is shaping India’s Tech-Ade. He emphasized how CP PLUS is pioneering AI-led innovations, transforming the way India monitors, manages, and secures its rapidly expanding urban landscape. “AI is no longer a futuristic concept – it is here, driving real-world change. At CP PLUS, we are leveraging AI-driven surveillance to build a smarter, safer, and more connected India. Our solutions empower authorities with real-time intelligence, enabling them to respond proactively to mobility challenges while ensuring security at every turn,” said Mr. Johar during his session at the expo. With increasing urbanization, India’s cities require robust, scalable, and intelligent security solutions to ensure smooth mobility and enhanced public safety. With its CarKam Series, CP PLUS doesn’t just keep pace with the future – it defines it. From resolving disputes to capturing life’s fleeting moments, these dashcams turn every drive into a journey worth remembering. CP PLUS is a global player in advanced security and surveillance solutions, offering AI-powered innovations, indigenized technology, and world-class solutions tailored to the evolving needs of India’s urban infrastructure. With a vision to drive smart, safe, and connected cities, CP PLUS continues to redefine surveillance and security across multiple sectors. Read More

Read More
Enterprises

Indian Enterprises Confront Zero-Day Vulnerabilities: Strengthening Cyber Resilience and Data Recovery Strategies

As business and enterprises in India actively advance their digital transformation, virtualization and AI solutions are rapidly being integrated into daily operations. However, as risks to foundational platforms increase, cybersecurity governance is becoming an increasingly critical concern. On March 4, 2025, Broadcom issued a security advisory addressing zero-day vulnerabilities affecting its virtualization environment built on prominent software platforms. These vulnerabilities have a severity score as high as 9.3 (from 0 to 10, where zero means they are the least severe and 10 means they are the most severe) and show signs of active exploitation. According to Shadowserver Foundation, a nonprofit security organization, more than 40,000 ESXi instances worldwide are currently at risk. China, France, and the United States are the top 3 affected countries. The true impact of security vulnerabilities A company’s IT infrastructure usually consists of a virtual machine (VM) environment in which critical systems such as databases, email servers, and financial management systems are supported. Nearly all business operations, customer relations, and economic activities rely on a stable virtual environment. If a security vulnerability is found and leads to a cyberattack or data breach, there can be severe consequences. If financial records, customer information, and internal communications are exposed, this could lead to major compliance violations – especially for industries subject to strict data protection regulations such as the financial or healthcare industry. The legal risks and financial losses could be catastrophic. In the event of a security flaw that results in a ransomware attack, the hackers may demand a hefty ransom, which could result in significant downtime for businesses and permanently tarnish their reputation. Not only does this impact enterprises, but in today’s interconnected world, a cyberattack on a company’s VM environment could also impact suppliers, partners, customers, and more, effectively leading to a supply chain crisis. This could disrupt the entire business ecosystem and magnify the impact of the cyberattack. As you can see, given these risks, organizations must be proactive in implementing disaster recovery strategies that protect critical systems and provide long-term stability. Synology recommends 5 key protection approaches to effectively enhance recovery strategies for virtual environments: Companies need to implement a strong disaster recovery strategy to mitigate risks in virtualized environments and ensure fast data recovery in the event of a cyberattack. Ahead of World Backup Day, Synology recommends that enterprises deploy a dedicated backup server within their virtualized environment and implement 5 key protection strategies to enhance their backup and recovery mechanisms. ● Perform backups regularly to prevent data silos Ensure that data in virtualized environments is regularly backed up with an Auto Backup feature that automatically detects and protects all virtual machines, ensuring comprehensive data coverage. ● Verify and test your backups The backup server is equipped with a built-in Hypervisor that automatically verifies backup images after completion, checking data integrity. Additionally, businesses can record backup verification processes or conduct manual periodic checks to ensure the recovery mechanism remains functional without disrupting the production environment.● Minimize downtime with flexible recovery options In the event of an attack or unexpected failure, maintaining uninterrupted operations is the top priority. IT teams can leverage virtualization technology to instantly mount services and restore business operations swiftly, minimizing impact. ● Cross-Platform Recovery to Reduce Single-Platform Risks Enterprises should deploy virtual servers across multiple platforms. For instance, if a business is using VMware and the environment is compromised or crashes, services can be restored on alternative platforms such as Hyper-V to distribute risk. ● Cost-Effective, Scalable Protection Synology ActiveProtect does not charge backup licensing fees based on the number of virtual machines, meaning businesses can scale their virtualized environments without incurring additional costs while still benefiting from a comprehensive backup and recovery solution. Conclusion With the growing threats of cyberattacks, organizations must be proactive in implementing disaster recovery strategies that are capable of safeguarding your company data against ransomware attacks, security breaches, and system failures. By deploying the Synology ActiveProtect appliance, businesses can implement a reliable data protection solution to protect their virtual machine environments, reduce downtime, and prevent operational disruptions. In the digital age, setting up a comprehensive cybersecurity and disaster recovery plan is the key to ensuring long-term stability and resilience for businesses. Read More

Read More