A combination of rising geopolitical uncertainties, growing cloud adoption and emerging technologies such as artificial intelligence (AI) is adding to the increasing complexities of cyberspace. The Data Security Council of India’s “India Cyber Threat Report 2025” identifies trojans (43.38 per cent of all detections), infectors (34.23 per cent) and other malware types (22.39 per cent) as the prominent threat vectors. Major data breaches were reported last year at the Telangana Police Hawk Eye app, BSNL and boAt, while this year, several government entities have been targeted by ransomware, distributed denial-of-service attacks, data breaches and malware infections. Meanwhile, there has been an alarming increase in the monetisation of cybercrime not only in metropolitan areas, but also in India’s rural hinterland. As per industry estimates, India lost Rs 230 billion in 2024 due to mounting cybercrimes, most of which were triggered by AI frauds.
Common network safeguards
Given the complex cybersecurity landscape, several cloud network security solutions are emerging to help mitigate these threats:
- Sandboxing and antivirus software are essential for identifying dangerous files. While sandboxing offers a secure setting for examining questionable data, antivirus software blocks known malware threats.
- Virtual private networks are another growing trend in network security solutions. They establish encrypted tunnels, sometimes referred to as internet protocol security (IPSec) tunnels, between users and distant servers, ensuring the confidentiality and security of data packets transmitted over open or unprotected networks. IPsec is particularly useful when establishing secure connections between distant offices or between remote users and the corporate network.
- Secure access service edge enables network traffic filtration to control and monitor external activities, enforces strict access based on user identity, and prevents malware and unknown attacks. Its key components include:
- Firewall: It examines data packets and decides whether to block or allow them, thereby monitoring, filtering, and regulating incoming and outgoing network traffic based on pre-established security rules.
- Intrusion prevention system (IPS): It is designed to identify and prevent both known and potential threats before they compromise network core or edge devices. It also offers features such as virtual patching to address network-layer vulnerabilities.
- Domain name system (DNS) filtering: It helps companies to prevent domain-based threats such as tunnelling and DNS hijacking.
- Secure web gateway: It is a cloud-delivered checkpoint between users and the internet.
- Firewall-as-a-service: A cloud-based firewall provides access control, complete traffic inspection, IPS, threat detection and prevention, and DNS security.
- Cloud access security broker: It is a security layer designed specifically to protect cloud-based applications and resources.
- Zero trust network access: It automatically creates encrypted tunnels between users and authorised resources, ensuring all data in transit remains private and secure.
Software-defined wide area network: A networking technology that dynamically routes data through the most efficient available channel.
Key challenges in network security
To begin with, hackers now exploit the public cloud environment as a vast and attractive attack surface, taking advantage of poorly secured cloud ports to gain access to and disrupt cloud operations and data. A recent example was the cyberattack on the Kashmir Power Development Corporation in May 2025, alongside numerous other official websites targeted during Operation Sindoor. In some cases, the virtual infrastructure is completely under the authority of cloud providers, who keep it hidden from their clients. Such unrestricted administrator access may raise the possibility of data breaches and insider threats. A whistleblower reported this year that a US government efficiency initiative had witnessed a surge in sensitive data leaving the agency. Remote work and bring-your-own-device regulations have also created new risks as employees’ devices often lack robust network security measures. Resource and financial constraints also hinder enterprises from adopting cybersecurity solutions. Industry estimates suggest that cybersecurity should account for 7-10 per cent of an organisation’s IT expenditure.
Conclusion
The evolving threat landscape underscores that cybersecurity is not just a technical safeguard but also a strategic imperative. From malware to ransomware, attackers are continuously finding new ways to exploit vulnerabilities, and the growing monetisation of cybercrime has only raised the stakes. While next-generation tools such as zero trust, cloud firewalls and AI-driven threat detection are strengthening defences, technology alone is not enough. Enterprises must invest consistently, build cyber resilience into their core operations and foster a culture of security awareness across their workforce. As the digital economy becomes increasingly critical to national and business interests, the ability to secure networks will not only instil organisational trust but also ensure long-term competitiveness.