Author: Malavika Madgula
Malavika Madgula is a writer and coffee lover from Mumbai, India, with a post-graduate degree in finance and an interest in the world. She can usually be found reading dystopian fiction cover to cover. Currently, she works as a travel content writer and hopes to write her own dystopian novel one day.
While everybody is familiar with the evolution of mobile networks, from 3G to 4G and now to 5G, Wi-Fi technology has also been advancing simultaneously. Imagine attending a virtual class, streaming an 8K film, and managing an entire home full of smart devices – all at once, and that too without a single glitch. This level of seamless digital living is no longer a distant dream, but rather a reality with the emergence and rise of Wi-Fi 7, which is a great leap forward for wireless connectivity – at least when it comes to the speed. Also known as 802.11be…
The winds of technological change have been brewing across the financial industry for quite a while, and concepts such as automated risk management, algorithmic trading, and digital banking are no longer futuristic but rather essential to modern finance. Two particularly groundbreaking technologies at the core of this transformation are AI (artificial intelligence) and blockchain, (besides big data and machine learning, of course). In the dynamic world of financial services, blockchain and AI, Generative AI (GenAI) in particular, have become linchpins for transformative change, redefining the strategic and operational horizons of the industry. Did you know that the value of the…
As everybody already knows by now, the US’s ICE (United States’ Immigration and Customs Enforcement) began deploying facial recognition for the first time in 2025 in the field, a practice that was only deployed in investigatory settings in the past… The fact that a government agency was using facial recognition systems as definitive identifications in the field is grossly irresponsible. On the other end of the spectrum, Dominick Skinner, a Netherlands-based immigration activist, used facial recognition and AI (artificial intelligence) to reveal the identities of masked ICE agents. The problem? The ICE agent who shot a US citizen was being…
Enterprise networks are not just expensive; they’re risky and complex – and they aren’t getting easier… The WAN (Wide Area Network) isn’t just a critical important part of the enterprise network and information infrastructure, but also a key enabler of the innovation and convergence infrastructure. With coverage ranging from tens to thousands of kilometres, WAN connects users, intelligent products, cloud platforms, branches, enterprise factories, and more. At the same time, it enables efficient collaboration between different industries and quick implementation of innovative apps and services. After all, the key to enterprise digital transformation is data value mining, and efficient data…
In the second half of August 2017, a nine-judge bench of the Supreme Court of India upheld privacy as a fundamental right, protected under Article 21 of the Indian Constitution in the landmark Puttaswamy judgement… At the time, we had no idea that that landmark ruling would change our lives, albeit so slowly that we probably didn’t see it coming. Cut to 2023, and the DPDP (Digital Personal Data Protection) Act saw the light of day. Designed to be the basis for India’s personal data regulatory regime and protection, it stayed in the incubator for two years until its regulators…
In the very first week of January 2026, the “Scattered Lapsus$ Hunters,” a collaboration between prolific cybercrime collectives Lapsus$, ShinyHunters, and Scattered Spider, were making noise in the cybercrime world… They boasted about stealing large amounts of data by hacking cybersecurity firm Resecurity on their Telegram channel, only to learn that they had stepped into a trap. It turns out that Resecurity had planted a “honeypot” in an emulated environment, with the data mimicking a business application, right down to financial transactions. Resecurity had been preparing for months to make the lure attractive, and the hackers took the bait, with…
Once upon a time, we really used to put a lot of effort into spinning content – written, visual, and interactive – to publish on the internet. Now? Not so much… Get this – an Indian AI slop channel garnered more than 2.76 million subscribers in 2025, with 619 videos. The subject? An AI-generated “realistic” monkey telling stories through supposedly dramatic, hilarious, and heart-touching human-style situations. And according to a Kapwing study, this channel amassed annual earnings of more than USD 4 million (INR 38 crore)! The Infiltration of AI Slop Does spending time on the internet lately feel like…
Digital disruption is the new-age norm, or rather, the new-age normal… Countless businesses have suffered cyber-attacks, with ransomware, distributed denial of service (DDoS), and phishing being some of the commonest, increasing in sophistication and frequency. According to SOCRadar data, ransomware was responsible for 39% of breaches in larger organisations and a whopping 88% in SMBs (small and medium businesses). Even phishing jumped to 18%, which is up from a 11% jump in 2024. Clearly, not only are cyberattacks and data breaches on the rise globally, but also no enterprise is immune to them, regardless of industry or size. What makes…
The sharp decline of Bitcoin and other cryptocurrencies and the recent turbulence in the market have certainly shaken investor confidence. It highlights the fact that cryptocurrency isn’t just vulnerable to market forces but could also possibly face threats from emerging technologies. If you’ve kept an eye on crypto news lately, you’ve probably read dramatic claims that quantum computing could possibly “break blockchains,” rendering cryptography obsolete. The headlines are eye-catching, but does it show a clear picture or is it all the signals without the noise? What is quantum computing and is it a real threat to crypto? If it is,…
Did you know that there’s a silent security risk lurking about your organisation? It often starts small: an employee drafting a report might paste sensitive data into ChatGPT or a sales rep auto-generates e-mails using AI (artificial intelligence). Then, it escalates: a software engineer might use a personal Gemini account to write test cases and generate boilerplate code, or a marketing designer generates campaign visuals from brand copy using Canva’s AI image tools. This is Shadow AI, which is using AI tools and systems without the involvement, monitoring, or approval of an organisation’s security or IT teams, leading to compliance…












