28 September 2025

Cybersecurity in India: Adapting to the Age of AI


India’s digital ascent, from instant payments to smart factories, is rewriting the rules of growth. But sustaining this progress depends on something deeper: the security and resilience of the systems that power it.

In boardrooms across India, leaders are realising that in the age of real-time transactions, cloud-driven services, and AI-powered customer experiences, a data breach can erase years of progress overnight. Cybersecurity has shifted from being a checkbox to becoming an essential enabler of trust and resilience in business.

India’s Digital Boom, and the Risks That Follow

India’s digital economy is booming, making up about 13.42% of India’s GDP currently (2024-25), and is on track to reach 20% by 2029-30.

UPI alone processed more than 16.99 billion transactions in January 2025, and broadband subscribers now stand close to a billion. IT revenues stood at USD 283 billion in FY24–25, e-commerce platforms are surging, and digital public infrastructure like the Aadhaar and DigiLocker touch hundreds of millions of citizens daily.

But as growth accelerates, so do risks. More users, endpoints, and data create a sprawling attack surface. Traditional security models, built for a slower pace of change, are struggling to keep up.

Complexity: The New Enemy of Cybersecurity

Fragmentation is quietly becoming India’s biggest vulnerability. A sprawl of disconnected tools creates silos, slows detection, and introduces blind spots. The challenge is compounded by the shift to multi-cloud environments, the explosion of endpoints from IoT devices, and the speed at which AI is reshaping digital operations. What was once manageable has now become overwhelming, and attackers are quick to exploit these cracks.

The 2025 Fortinet-IDC Report on State of Cybersecurity in Asia-Pacific highlights the growing financial impact of cyber incidents, with one in five breaches costing organisations more than US$500,000 to recover. BFSI saw fraud cases quadruple, while insider threats and regulatory audits continue to expose weaknesses.

No comments: