{"id":24653,"date":"2025-06-13T00:28:04","date_gmt":"2025-06-12T18:58:04","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=24653"},"modified":"2025-06-27T11:50:29","modified_gmt":"2025-06-27T06:20:29","slug":"breaches-as-national-security-risks-why-your-firewall-is-indias-new-border-post","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/breaches-as-national-security-risks-why-your-firewall-is-indias-new-border-post\/","title":{"rendered":"Breaches as National Security Risks: Why Your Firewall Is India\u2019s New Border Post"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24653\" class=\"elementor elementor-24653\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32922ab e-flex e-con-boxed e-con e-parent\" data-id=\"32922ab\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a1bce5 elementor-widget elementor-widget-text-editor\" data-id=\"4a1bce5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"color: #000000;\">On May 7, 2024, as air-raid sirens echoed across 300 districts during India\u2019s civil defense drill, a parallel digital offensive was silently breaching the firewalls of our financial institutions. A state-sponsored hacking group (known as APT36) attacked India\u2019s stock exchanges using weaponized emails and malware called CrimsonRAT. The act wasn\u2019t random; it was digital warfare timed to exploit national distraction.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc74d6d elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\" data-id=\"bc74d6d\" data-element_type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor-pro - v3.20.0 - 26-03-2024 *\/\n@charset \"UTF-8\";.entry-content blockquote.elementor-blockquote:not(.alignright):not(.alignleft),.entry-summary blockquote.elementor-blockquote{margin-right:0;margin-left:0}.elementor-widget-blockquote blockquote{margin:0;padding:0;outline:0;font-size:100%;vertical-align:baseline;background:transparent;quotes:none;border:0;font-style:normal;color:#3f444b}.elementor-widget-blockquote blockquote .e-q-footer:after,.elementor-widget-blockquote blockquote .e-q-footer:before,.elementor-widget-blockquote blockquote:after,.elementor-widget-blockquote blockquote:before,.elementor-widget-blockquote blockquote cite:after,.elementor-widget-blockquote blockquote cite:before{content:none}.elementor-blockquote{transition:.3s}.elementor-blockquote__author,.elementor-blockquote__content{margin-bottom:0;font-style:normal}.elementor-blockquote__author{font-weight:700}.elementor-blockquote .e-q-footer{margin-top:12px;display:flex;justify-content:space-between}.elementor-blockquote__tweet-button{display:flex;transition:.3s;color:#1da1f2;align-self:flex-end;line-height:1;position:relative;width:-moz-max-content;width:max-content}.elementor-blockquote__tweet-button:hover{color:#0967a0}.elementor-blockquote__tweet-button span{font-weight:600}.elementor-blockquote__tweet-button i,.elementor-blockquote__tweet-button span{vertical-align:middle}.elementor-blockquote__tweet-button i+span,.elementor-blockquote__tweet-button svg+span{margin-left:.5em}.elementor-blockquote__tweet-button svg{fill:#1da1f2;height:1em;width:1em}.elementor-blockquote__tweet-label{white-space:pre-wrap}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button{padding:.7em 1.2em;border-radius:100em;background-color:#1da1f2;color:#fff;font-size:15px}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:hover,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button:hover{background-color:#0967a0;color:#fff}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:hover:before,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button:hover:before{border-right-color:#0967a0}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button svg,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button svg{fill:#fff;height:1em;width:1em}.elementor-blockquote--button-skin-bubble.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button,.elementor-blockquote--button-skin-classic.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button{padding:0;width:2em;height:2em}.elementor-blockquote--button-skin-bubble.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button i,.elementor-blockquote--button-skin-classic.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button i{position:absolute;left:50%;top:50%;transform:translate(-50%,-50%)}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:before{content:\"\";border:.5em solid transparent;border-right-color:#1da1f2;position:absolute;left:-.8em;top:50%;transform:translateY(-50%) scaleY(.65);transition:.3s}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-left .elementor-blockquote__tweet-button:before{right:auto;left:-.8em;border-right-color:#1da1f2;border-left-color:transparent}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-left .elementor-blockquote__tweet-button:hover:before{border-right-color:#0967a0}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-right .elementor-blockquote__tweet-button:before{left:auto;right:-.8em;border-right-color:transparent;border-left-color:#1da1f2}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-right .elementor-blockquote__tweet-button:hover:before{border-left-color:#0967a0}.elementor-blockquote--skin-boxed .elementor-blockquote{background-color:#f9fafa;padding:30px}.elementor-blockquote--skin-border .elementor-blockquote{border-color:#f9fafa;border-left:7px #f9fafa;border-style:solid;padding-left:20px}.elementor-blockquote--skin-quotation .elementor-blockquote:before{content:\"\u201c\";font-size:100px;color:#f9fafa;font-family:Times New Roman,Times,serif;font-weight:900;line-height:1;display:block;height:.6em}.elementor-blockquote--skin-quotation .elementor-blockquote__content{margin-top:15px}.elementor-blockquote--align-left .elementor-blockquote__content{text-align:left}.elementor-blockquote--align-left .elementor-blockquote .e-q-footer{flex-direction:row}.elementor-blockquote--align-right .elementor-blockquote__content{text-align:right}.elementor-blockquote--align-right .elementor-blockquote .e-q-footer{flex-direction:row-reverse}.elementor-blockquote--align-center .elementor-blockquote{text-align:center}.elementor-blockquote--align-center .elementor-blockquote .e-q-footer,.elementor-blockquote--align-center .elementor-blockquote__author{display:block}.elementor-blockquote--align-center .elementor-blockquote__tweet-button{margin-right:auto;margin-left:auto}<\/style>\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tCyberattacks have become deliberate extensions of geopolitical strategy.\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">PwC\u2019s 2024 Global Threat Report<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d78e6e e-flex e-con-boxed e-con e-parent\" data-id=\"2d78e6e\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6059410 elementor-widget elementor-widget-text-editor\" data-id=\"6059410\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">While most attempts were deflected, approximately 150 confirmed successful attacks caused targeted disruptions.\u00a0<\/span><\/p><p><span style=\"color: #000000;\">When trading halted for 4 hours at India\u2019s largest stock exchange, the battlefield made its message clear: <b>Your data center is now strategic national infrastructure.<\/b><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f97e961 e-flex e-con-boxed e-con e-parent\" data-id=\"f97e961\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d750dd7 elementor-widget elementor-widget-heading\" data-id=\"d750dd7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Why This Changes Everything for Indian Businesses<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-832b66d e-flex e-con-boxed e-con e-parent\" data-id=\"832b66d\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dfd80ec elementor-widget elementor-widget-text-editor\" data-id=\"dfd80ec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">India\u2019s security paradigm has irrevocably shifted, and the rules have changed:<\/span><\/p><p><span style=\"color: #000000;\">\u2022 78% of successful breaches now target private enterprises (CERT-In 2023)<\/span><\/p><p><span style=\"color: #000000;\">\u2022 Financial, healthcare, and energy firms are classified as &#8220;critical infrastructure&#8221; under the National Cyber Security Policy 2023<\/span><\/p><p><span style=\"color: #000000;\">\u2022\u00a0<\/span><a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/sebi-cscrf-explained\/\" target=\"_blank\" rel=\"noopener\">SEBI\u2019s Cybersecurity Framework<\/a><span style=\"color: #000000;\">\u00a0mandates 60-minute threat containment for market entities\u2014yet 61% lack tested response plans (PwC India)<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f9a5c4 e-flex e-con-boxed e-con e-parent\" data-id=\"5f9a5c4\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dae80c elementor-widget elementor-widget-heading\" data-id=\"9dae80c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Anatomy of a Hybrid Attack<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f9784e8 e-flex e-con-boxed e-con e-parent\" data-id=\"f9784e8\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49b7912 elementor-widget elementor-widget-text-editor\" data-id=\"49b7912\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">APT36\u2019s assault revealed multi-layered playbook other threat actors now replicate:<\/span><\/p><table class=\"MsoTableGrid\" style=\"border-collapse: collapse; border: initial none initial;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td style=\"border-width: 1pt; border-color: windowtext; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\"><b>Attack Type<\/b><\/span><\/p><\/td><td style=\"border-top-width: 1pt; border-right-width: 1pt; border-bottom-width: 1pt; border-top-color: windowtext; border-right-color: windowtext; border-bottom-color: windowtext; border-left: none; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\"><b>Description<\/b><\/span><\/p><\/td><td style=\"border-top-width: 1pt; border-right-width: 1pt; border-bottom-width: 1pt; border-top-color: windowtext; border-right-color: windowtext; border-bottom-color: windowtext; border-left: none; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\"><b>Impact<\/b><\/span><\/p><\/td><\/tr><tr><td style=\"border-right-width: 1pt; border-bottom-width: 1pt; border-left-width: 1pt; border-right-color: windowtext; border-bottom-color: windowtext; border-left-color: windowtext; border-top: none; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Website Defacements<\/span><\/p><\/td><td style=\"border-top: none; border-left: none; border-bottom-width: 1pt; border-bottom-color: windowtext; border-right-width: 1pt; border-right-color: windowtext; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Government and institutional sites targeted<\/span><\/p><\/td><td style=\"border-top: none; border-left: none; border-bottom-width: 1pt; border-bottom-color: windowtext; border-right-width: 1pt; border-right-color: windowtext; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Disruptions to public-facing platforms<\/span><\/p><\/td><\/tr><tr><td style=\"border-right-width: 1pt; border-bottom-width: 1pt; border-left-width: 1pt; border-right-color: windowtext; border-bottom-color: windowtext; border-left-color: windowtext; border-top: none; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Data Theft<\/span><\/p><\/td><td style=\"border-top: none; border-left: none; border-bottom-width: 1pt; border-bottom-color: windowtext; border-right-width: 1pt; border-right-color: windowtext; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Airport and telecom breaches<\/span><\/p><\/td><td style=\"border-top: none; border-left: none; border-bottom-width: 1pt; border-bottom-color: windowtext; border-right-width: 1pt; border-right-color: windowtext; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Some leaked data appeared on dark web<\/span><\/p><\/td><\/tr><tr><td style=\"border-right-width: 1pt; border-bottom-width: 1pt; border-left-width: 1pt; border-right-color: windowtext; border-bottom-color: windowtext; border-left-color: windowtext; border-top: none; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Phishing and Espionage<\/span><\/p><\/td><td style=\"border-top: none; border-left: none; border-bottom-width: 1pt; border-bottom-color: windowtext; border-right-width: 1pt; border-right-color: windowtext; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Spear-phishing with Crimson RAT malware<\/span><\/p><\/td><td style=\"border-top: none; border-left: none; border-bottom-width: 1pt; border-bottom-color: windowtext; border-right-width: 1pt; border-right-color: windowtext; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Persistent access and intelligence theft<\/span><\/p><\/td><\/tr><tr><td style=\"border-right-width: 1pt; border-bottom-width: 1pt; border-left-width: 1pt; border-right-color: windowtext; border-bottom-color: windowtext; border-left-color: windowtext; border-top: none; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">DDoS Attacks<\/span><\/p><\/td><td style=\"border-top: none; border-left: none; border-bottom-width: 1pt; border-bottom-color: windowtext; border-right-width: 1pt; border-right-color: windowtext; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Services intermittently knocked offline<\/span><\/p><\/td><td style=\"border-top: none; border-left: none; border-bottom-width: 1pt; border-bottom-color: windowtext; border-right-width: 1pt; border-right-color: windowtext; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Temporary disruption<\/span><\/p><\/td><\/tr><tr><td style=\"border-right-width: 1pt; border-bottom-width: 1pt; border-left-width: 1pt; border-right-color: windowtext; border-bottom-color: windowtext; border-left-color: windowtext; border-top: none; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">GPS Spoofing Attempts<\/span><\/p><\/td><td style=\"border-top: none; border-left: none; border-bottom-width: 1pt; border-bottom-color: windowtext; border-right-width: 1pt; border-right-color: windowtext; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Navigation interference<\/span><\/p><\/td><td style=\"border-top: none; border-left: none; border-bottom-width: 1pt; border-bottom-color: windowtext; border-right-width: 1pt; border-right-color: windowtext; padding: 0cm 5.4pt;\" valign=\"top\"><p class=\"MsoNormal\" style=\"margin-bottom: 8.0pt; line-height: 107%;\"><span style=\"color: #000000;\">Limited reported impact<\/span><\/p><\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d2fb5b6 e-flex e-con-boxed e-con e-parent\" data-id=\"d2fb5b6\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-02ff0d9 elementor-widget elementor-widget-text-editor\" data-id=\"02ff0d9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">Indian officials confirmed that no major damage was sustained to critical infrastructure. However, the attacks brought systemic vulnerabilities to the forefront, particularly in mid-tier organizations that often serve as supply chain entry points.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac986c8 e-flex e-con-boxed e-con e-parent\" data-id=\"ac986c8\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5d4881 elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\" data-id=\"d5d4881\" data-element_type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\t\u201cState-sponsored cyberattacks are a clear and present danger to India\u2019s national security and economic stability. In this new era of digital warfare, the lines between war and peace are increasingly blurred.\u201d\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-399ffe4 e-flex e-con-boxed e-con e-parent\" data-id=\"399ffe4\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77953dd elementor-widget elementor-widget-heading\" data-id=\"77953dd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Mid-Market Firms Are Prime Targets<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b205b99 e-flex e-con-boxed e-con e-parent\" data-id=\"b205b99\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcb5e08 elementor-widget elementor-widget-text-editor\" data-id=\"bcb5e08\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">You might think, &#8220;We\u2019re not a stock exchange\u2014why target us?&#8221; Consider:<\/span><\/p><p><span style=\"color: #000000;\">1. <b>Supply Chain Backdoors<\/b>: 83% of Indian firms lack third-party breach protocols (KPMG), making you entry points for attacks on partners.<\/span><\/p><p><span style=\"color: #000000;\">2. <b>Data as Geopolitical Leverage<\/b>: Customer databases, IP, and financial records are resold to foreign intelligence agencies. Last year, healthcare records sold for $100\/patient on dark web markets (Group-IB Threat Intelligence, 2023).<\/span><\/p><p><span style=\"color: #000000;\">3. <b>Critical Infrastructure Gaps<\/b>: 68% of India\u2019s power distribution networks rely on mid-market tech vendors (NASSCOM 2024).<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9042530 e-flex e-con-boxed e-con e-parent\" data-id=\"9042530\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0e88877 elementor-widget elementor-widget-heading\" data-id=\"0e88877\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The SEBI Mandate: Your Compliance is National Defense<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f422749 e-flex e-con-boxed e-con e-parent\" data-id=\"f422749\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bed485f elementor-widget elementor-widget-text-editor\" data-id=\"bed485f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a style=\"background-color: #ffffff; font-size: 1rem;\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/sebi-cscrf-explained\/\" target=\"_blank\" rel=\"noopener\">SEBI\u2019s Cyber Resilience Framework (CSCRF)<\/a><span style=\"color: #000000;\">\u00a0now enforces what was once advisory:<\/span><\/p><p><span style=\"color: #000000;\">\u2022 Quarterly cyber war games simulating APT36-style attacks<\/span><\/p><p><span style=\"color: #000000;\">\u2022 6-hour CERT-In reporting for severe incidents<\/span><\/p><p><span style=\"color: #000000;\">\u2022 Third-party audits of privileged access controls<\/span><\/p><p><span style=\"color: #000000;\">Non-compliance carries existential stakes: Financial sector entities risk license suspension (SEBI Circular CIR\/MRD\/DP\/13\/2024).<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e25d467 e-flex e-con-boxed e-con e-parent\" data-id=\"e25d467\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e798e1 elementor-widget elementor-widget-heading\" data-id=\"8e798e1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">iValue\u2019s Managed SOC: Real-Time Defense Built for Complex Environments<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b9ce328 e-flex e-con-boxed e-con e-parent\" data-id=\"b9ce328\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cb7110 elementor-widget elementor-widget-text-editor\" data-id=\"4cb7110\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">For enterprises defending India\u2019s financial frontlines, security operations can no longer rely on siloed tools or passive monitoring. iValue\u2019s&nbsp;<\/span><a href=\"https:\/\/ivaluegroup.com\/en-gl\/enterprise-security-management\/\" target=\"_blank\">Managed SOC<\/a><span style=\"color: #000000;\">&nbsp;provides an end-to-end security operations framework that goes beyond alerting.<\/span><\/p>\n<p><span style=\"color: #000000;\">Here\u2019s how iValue\u2019s SOC supports enterprises facing nation-grade threats:<\/span><\/p>\n<p><span style=\"color: #000000;\">\u2022 <b>Security Validation:&nbsp;<\/b><span style=\"font-style: inherit; font-weight: inherit;\">iValue\u2019s team assesses the existing security environment to identify gaps, misconfigurations, and potential blind spots. This forms the foundation for an action plan tailored to the organization\u2019s risk profile.<\/span><\/span><\/p>\n<p><span style=\"color: #000000;\">\u2022 <b>24&#215;7 Monitoring with Real-Time Intervention:&nbsp;<\/b><span style=\"font-style: inherit; font-weight: inherit;\">iValue\u2019s SOC delivers always-on monitoring with live threat interception capabilities. The system isn\u2019t just observing; it actively intervenes to minimize risks as they unfold.<\/span><\/span><\/p>\n<p><span style=\"color: #000000;\">\u2022 <b>Incident Response and Downtime Reduction:&nbsp;<\/b><span style=\"font-style: inherit; font-weight: inherit;\">The SOC reduces response times by implementing direct response protocols and preemptive resolutions to limit the impact of security incidents.<\/span><\/span><\/p>\n<p><span style=\"color: #000000;\">\u2022 <b>Integrated Compliance Support:&nbsp;<\/b><span style=\"font-style: inherit; font-weight: inherit;\">iValue\u2019s SOC incorporates best practices to help organizations stay aligned with SEBI mandates, CERT-In reporting requirements, and emerging national frameworks. Documentation is maintained in audit-ready formats.<\/span><\/span><\/p>\n<p><span style=\"color: #000000;\">\u2022 <b>Proactive Risk Mitigation:&nbsp;<\/b><span style=\"font-style: inherit; font-weight: inherit;\">The SOC works closely with enterprise teams to strategize and develop long-term security roadmaps, strengthening the organization\u2019s defense posture over time.<\/span><\/span><\/p>\n<p><span style=\"color: #000000;\">\u2022 <b>Continuous Performance Improvement:&nbsp;<\/b><span style=\"font-style: inherit; font-weight: inherit;\">The SOC enables smarter, faster decision-making by providing detailed reporting, root cause analysis, and lessons learned from live incidents.<\/span><\/span><\/p>\n<h4><span style=\"color: #000000;\"><b>How iValue\u2019s Managed SOC Builds Defense, Powered by Leading Technologies:<\/b><\/span><\/h4>\n<table>\n<thead>\n<tr>\n<th><span style=\"color: #000000;\"><strong>SOC Capability<\/strong><\/span><\/th>\n<th><span style=\"color: #000000;\"><strong>Integrated OEMs<\/strong><\/span><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><span style=\"color: #000000;\"><strong>24&#215;7 Threat Monitoring and Detection<\/strong><\/span><\/td>\n<td><span style=\"color: #000000;\">Google SecOps, Splunk, Zabbix, Symphony Summit<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\"><strong>Endpoint Detection and Response (EDR)<\/strong><\/span><\/td>\n<td><span style=\"color: #000000;\">SentinelOne, Microsoft Defender, CrowdStrike<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\"><strong>Network Security &amp; Firewall Integration<\/strong><\/span><\/td>\n<td><span style=\"color: #000000;\">Check Point, Forcepoint, Palo Alto Networks<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\"><strong>Data Loss Prevention (DLP)<\/strong><\/span><\/td>\n<td><span style=\"color: #000000;\">Forcepoint, Symantec, Netskope<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\"><strong>Identity and Privileged Access Control<\/strong><\/span><\/td>\n<td><span style=\"color: #000000;\">CyberArk, RSA, Entrust, Yubico<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\"><strong>Compliance-Ready Reporting and SIEM<\/strong><\/span><\/td>\n<td><span style=\"color: #000000;\">Splunk, Google Chronicle, Zabbix<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\"><strong>Cloud and Application Security<\/strong><\/span><\/td>\n<td><span style=\"color: #000000;\">Netskope, Forcepoint, Google SecOps, Microsoft Cloud Security<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\"><strong>Incident Response Automation<\/strong><\/span><\/td>\n<td><span style=\"color: #000000;\">Symphony Summit, Google SecOps, CyberArk playbooks<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4><span style=\"color: #000000;\"><b>Key Features Delivered Through This OEM Collaboration:<\/b><\/span><\/h4>\n<ul>\n<li><span style=\"color: #000000;\"><b>Real-Time Threat Visibility:&nbsp;<\/b><span style=\"font-style: inherit; font-weight: inherit;\">Integrated dashboards powered by Google SecOps, Zabbix, and Splunk provide live threat feeds across endpoints, networks, and cloud applications.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-style: inherit;\"><b>Rapid Incident Containment:&nbsp;<\/b><\/span><span style=\"font-style: inherit; font-weight: inherit;\">SOC playbooks leverage Symphony Summit for response orchestration and CyberArk for securing privileged access during active incidents.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-style: inherit;\"><b>Comprehensive Endpoint Coverage:&nbsp;<\/b><\/span><span style=\"font-style: inherit; font-weight: inherit;\">SentinelOne and Microsoft Defender ensure endpoint security across hybrid environments.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-style: inherit;\"><b>Cloud-Aware Security Posture:&nbsp;<\/b><\/span><span style=\"font-style: inherit; font-weight: inherit;\">Netskope, Forcepoint, and Google\u2019s cloud-native solutions enable continuous protection for SaaS, web, and cloud-native workloads.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-style: inherit;\"><b>Compliance-Driven Documentation:&nbsp;<\/b><\/span><span style=\"font-style: inherit; font-weight: inherit;\">SIEM systems and incident logs aligned with SEBI and CERT-In requirements are managed through Splunk, Zabbix, and Symphony Summit platforms.<\/span><\/span><\/li>\n<\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1e89cc elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\" data-id=\"a1e89cc\" data-element_type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tOur Managed SOC combines best-in-class technologies from leading OEMs with skilled SOC analysts, ensuring that security operations remain tightly aligned to real-time threats and regulatory expectations.\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee8a624 e-flex e-con-boxed e-con e-parent\" data-id=\"ee8a624\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ca0073 elementor-widget elementor-widget-heading\" data-id=\"8ca0073\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Your Call to Arms: Three Practical Steps Every Leader Can Take<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e4c06b3 e-flex e-con-boxed e-con e-parent\" data-id=\"e4c06b3\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a49969 elementor-widget elementor-widget-text-editor\" data-id=\"5a49969\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #000000;\">Mid-market enterprises often struggle to integrate disconnected tools. iValue\u2019s Managed SOC delivers an OEM-agnostic, fully integrated solution that simplifies security operations while enhancing visibility and control.\u00a0<\/span><span style=\"color: #000000;\">The era of &#8220;business-only&#8221; cybersecurity is over. When breaches erode market stability and fund adversarial regimes, defense becomes patriotic duty. Three immediate steps:<\/span><\/p><p><span style=\"color: #000000;\">1. <b>Conduct a Sovereignty Gap Assessment<\/b>: Audit your exposure to APT36-style hybrid attacks.<\/span><\/p><p><span style=\"color: #000000;\">2. <b>Rehearse the Breach<\/b>: Test IRPs against SEBI\u2019s 60-minute containment standard.<\/span><\/p><p><span style=\"color: #000000;\">3. <b>Deploy Nation-Grade SOC<\/b>: 24\/7 threat hunting with geopolitical context.<\/span><\/p><p><span style=\"color: #000000;\">India\u2019s digital sovereignty depends on private sector readiness. The question isn\u2019t if you\u2019ll be targeted\u2014but whether you\u2019ll hold the line.<\/span><\/p><p><span style=\"color: #000000;\">Managed SOC isn\u2019t just a service layer\u2014it\u2019s now essential for enterprises safeguarding market stability, customer trust, and national interests. iValue\u2019s approach focuses on building operational resilience, not just compliance.<\/span><\/p><p><span style=\"color: #000000;\">If you\u2019re preparing your security teams for faster, coordinated, and context-aware defense, Managed SOC is your frontline solution.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a6527cb e-flex e-con-boxed e-con e-parent\" data-id=\"a6527cb\" data-element_type=\"container\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0954043 elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"0954043\" data-element_type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/ivaluegroup.com\/en-in\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-call-to-action.min.css\">\t\t<div class=\"elementor-cta\" data-e-bg-lazyload=\".elementor-bg\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: var(--e-bg-lazyload-loaded); --e-bg-lazyload: url(https:\/\/ivaluegroup.com\/en-in\/wp-content\/uploads\/sites\/2\/2025\/02\/what-is-data-protection-soc.jpg);\" role=\"img\" aria-label=\"what-is-data-protection-soc\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tReady to measure your security response?\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tDownload our Incident Response Checklist to assess your incident preparedness.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f55a0e0 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"f55a0e0\" data-element_type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor-pro - v3.20.0 - 26-03-2024 *\/\n.elementor-button.elementor-hidden,.elementor-hidden{display:none}.e-form__step{width:100%}.e-form__step:not(.elementor-hidden){display:flex;flex-wrap:wrap}.e-form__buttons{flex-wrap:wrap}.e-form__buttons,.e-form__buttons__wrapper{display:flex}.e-form__indicators{display:flex;justify-content:space-between;align-items:center;flex-wrap:nowrap;font-size:13px;margin-bottom:var(--e-form-steps-indicators-spacing)}.e-form__indicators__indicator{display:flex;flex-direction:column;align-items:center;justify-content:center;flex-basis:0;padding:0 var(--e-form-steps-divider-gap)}.e-form__indicators__indicator__progress{width:100%;position:relative;background-color:var(--e-form-steps-indicator-progress-background-color);border-radius:var(--e-form-steps-indicator-progress-border-radius);overflow:hidden}.e-form__indicators__indicator__progress__meter{width:var(--e-form-steps-indicator-progress-meter-width,0);height:var(--e-form-steps-indicator-progress-height);line-height:var(--e-form-steps-indicator-progress-height);padding-right:15px;border-radius:var(--e-form-steps-indicator-progress-border-radius);background-color:var(--e-form-steps-indicator-progress-color);color:var(--e-form-steps-indicator-progress-meter-color);text-align:right;transition:width .1s linear}.e-form__indicators__indicator:first-child{padding-left:0}.e-form__indicators__indicator:last-child{padding-right:0}.e-form__indicators__indicator--state-inactive{color:var(--e-form-steps-indicator-inactive-primary-color,#c2cbd2)}.e-form__indicators__indicator--state-inactive [class*=indicator--shape-]:not(.e-form__indicators__indicator--shape-none){background-color:var(--e-form-steps-indicator-inactive-secondary-color,#fff)}.e-form__indicators__indicator--state-inactive object,.e-form__indicators__indicator--state-inactive svg{fill:var(--e-form-steps-indicator-inactive-primary-color,#c2cbd2)}.e-form__indicators__indicator--state-active{color:var(--e-form-steps-indicator-active-primary-color,#39b54a);border-color:var(--e-form-steps-indicator-active-secondary-color,#fff)}.e-form__indicators__indicator--state-active [class*=indicator--shape-]:not(.e-form__indicators__indicator--shape-none){background-color:var(--e-form-steps-indicator-active-secondary-color,#fff)}.e-form__indicators__indicator--state-active object,.e-form__indicators__indicator--state-active svg{fill:var(--e-form-steps-indicator-active-primary-color,#39b54a)}.e-form__indicators__indicator--state-completed{color:var(--e-form-steps-indicator-completed-secondary-color,#fff)}.e-form__indicators__indicator--state-completed [class*=indicator--shape-]:not(.e-form__indicators__indicator--shape-none){background-color:var(--e-form-steps-indicator-completed-primary-color,#39b54a)}.e-form__indicators__indicator--state-completed .e-form__indicators__indicator__label{color:var(--e-form-steps-indicator-completed-primary-color,#39b54a)}.e-form__indicators__indicator--state-completed .e-form__indicators__indicator--shape-none{color:var(--e-form-steps-indicator-completed-primary-color,#39b54a);background-color:initial}.e-form__indicators__indicator--state-completed object,.e-form__indicators__indicator--state-completed svg{fill:var(--e-form-steps-indicator-completed-secondary-color,#fff)}.e-form__indicators__indicator__icon{width:var(--e-form-steps-indicator-padding,30px);height:var(--e-form-steps-indicator-padding,30px);font-size:var(--e-form-steps-indicator-icon-size);border-width:1px;border-style:solid;display:flex;justify-content:center;align-items:center;overflow:hidden;margin-bottom:10px}.e-form__indicators__indicator__icon img,.e-form__indicators__indicator__icon object,.e-form__indicators__indicator__icon svg{width:var(--e-form-steps-indicator-icon-size);height:auto}.e-form__indicators__indicator__icon .e-font-icon-svg{height:1em}.e-form__indicators__indicator__number{width:var(--e-form-steps-indicator-padding,30px);height:var(--e-form-steps-indicator-padding,30px);border-width:1px;border-style:solid;display:flex;justify-content:center;align-items:center;margin-bottom:10px}.e-form__indicators__indicator--shape-circle{border-radius:50%}.e-form__indicators__indicator--shape-square{border-radius:0}.e-form__indicators__indicator--shape-rounded{border-radius:5px}.e-form__indicators__indicator--shape-none{border:0}.e-form__indicators__indicator__label{text-align:center}.e-form__indicators__indicator__separator{width:100%;height:var(--e-form-steps-divider-width);background-color:#babfc5}.e-form__indicators--type-icon,.e-form__indicators--type-icon_text,.e-form__indicators--type-number,.e-form__indicators--type-number_text{align-items:flex-start}.e-form__indicators--type-icon .e-form__indicators__indicator__separator,.e-form__indicators--type-icon_text .e-form__indicators__indicator__separator,.e-form__indicators--type-number .e-form__indicators__indicator__separator,.e-form__indicators--type-number_text .e-form__indicators__indicator__separator{margin-top:calc(var(--e-form-steps-indicator-padding, 30px) \/ 2 - var(--e-form-steps-divider-width, 1px) \/ 2)}.elementor-field-type-hidden{display:none}.elementor-field-type-html{display:inline-block}.elementor-field-type-tel input{direction:inherit}.elementor-login .elementor-lost-password,.elementor-login .elementor-remember-me{font-size:.85em}.elementor-field-type-recaptcha_v3 .elementor-field-label{display:none}.elementor-field-type-recaptcha_v3 .grecaptcha-badge{z-index:1}.elementor-button .elementor-form-spinner{order:3}.elementor-form .elementor-button>span{display:flex;justify-content:center;align-items:center}.elementor-form .elementor-button .elementor-button-text{white-space:normal;flex-grow:0}.elementor-form .elementor-button svg{height:auto}.elementor-form .elementor-button .e-font-icon-svg{height:1em}.elementor-select-wrapper .select-caret-down-wrapper{position:absolute;top:50%;transform:translateY(-50%);inset-inline-end:10px;pointer-events:none;font-size:11px}.elementor-select-wrapper .select-caret-down-wrapper svg{display:unset;width:1em;aspect-ratio:unset;fill:currentColor}.elementor-select-wrapper .select-caret-down-wrapper i{font-size:19px;line-height:2}.elementor-select-wrapper.remove-before:before{content:\"\"!important}<\/style>\t\t<form class=\"elementor-form\" method=\"post\" name=\"IRP Checklist\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"24653\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"f55a0e0\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email\" required=\"required\" aria-required=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button type=\"submit\" class=\"elementor-button elementor-size-sm\">\n\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\" elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On May 7, 2024, as air-raid sirens echoed across 300 districts during India\u2019s civil defense drill, a parallel digital offensive was silently breaching the firewalls of our financial institutions. A state-sponsored hacking group (known as APT36) attacked India\u2019s stock exchanges using weaponized emails and malware called CrimsonRAT. The act wasn\u2019t random; it was digital warfare &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/breaches-as-national-security-risks-why-your-firewall-is-indias-new-border-post\/\"> <span class=\"screen-reader-text\">Breaches as National Security Risks: Why Your Firewall Is India\u2019s New Border Post<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":20195,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[131],"tags":[511,424,512,515,513,516,510,514],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/24653"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=24653"}],"version-history":[{"count":16,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/24653\/revisions"}],"predecessor-version":[{"id":24749,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/24653\/revisions\/24749"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/20195"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=24653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=24653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=24653"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=24653"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=24653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}