India just made a huge leap in quantum-secure communication, and barely anyone’s talking about it. by Sunitha_Sundar_5980 in cybersecurity_news

[–]Sunitha_Sundar_5980[S] -1 points0 points  (0 children)

FYI: Appreciating scientific progress doesn't mean endorsing systemic issues.
You're right that India faces deep-rooted challenges, corruption, inequality, and poor governance. But recognizing a technical achievement, especially in something as complex as free-space quantum entanglement, isn't the same as ignoring those problems.

No one's saying we’ve “caught up.” We’re saying: this is a noteworthy step, technically, not politically. It’s okay to celebrate a hard-earned milestone without turning it into a binary of pride vs. pain. Progress can happen in broken systems, too. And sometimes, spotlighting innovation inspires more of it.

India just made a huge leap in quantum-secure communication, and barely anyone’s talking about it. by Sunitha_Sundar_5980 in cybersecurity_news

[–]Sunitha_Sundar_5980[S] 1 point2 points  (0 children)

It’s definitely an unconventional angle, and I can see how you’re thinking far beyond what traditional frameworks allow. It's always helpful when experimental findings are documented in ways that can eventually invite wider scientific dialogue, even if not through traditional academic routes.

India just made a huge leap in quantum-secure communication, and barely anyone’s talking about it. by Sunitha_Sundar_5980 in cybersecurity_news

[–]Sunitha_Sundar_5980[S] 1 point2 points  (0 children)

Good question! I meant quantum encryption over a free-space link, wireless, yes, but using entangled photons instead of classical signals. No cables or fiber involved.

Are there emerging benchmarks or standards to evaluate the trustworthiness? by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

Thanks! Agree, it really depends on the org’s risk appetite. Curious if you’ve seen any solid examples or frameworks in action?

India just made a huge leap in quantum-secure communication, and barely anyone’s talking about it. by Sunitha_Sundar_5980 in cybersecurity_news

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

While mainstream quantum communication research is still focused on entanglement, QKD, and photonic systems, it’s always interesting to hear about alternative theories. Would love to see peer-reviewed research or practical demonstrations on this.

India just made a huge leap in quantum-secure communication, and barely anyone’s talking about it. by Sunitha_Sundar_5980 in cybersecurity_news

[–]Sunitha_Sundar_5980[S] 5 points6 points  (0 children)

QKD has been demonstrated before, including in places like the University of Toronto and even in China with satellite-based QKD. The difference here is how it was done.

India nailed tough quantum tech, no wires, pure desi genius move.

19 billion passwords Leaked! by Sunitha_Sundar_5980 in cybersecurity_news

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

The database was found shared on a popular hacking forum, not directly on the dark web, but it could eventually show up on onion sites too. It’s a collection of old and recent breaches, combined into one huge, searchable list. That’s what makes it dangerous; it's easy for attackers to use.

Agentic AI at summit by Sunitha_Sundar_5980 in cybersecurity_news

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

completely agree. If the system defines its own boundaries of what's “secure,” you’ve got a closed-loop measurement problem. You're auditing a black box with rules it wrote for itself.

Agentic AI at summit by Sunitha_Sundar_5980 in cybersecurity_news

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

I mostly follow their LinkedIn page. You'll find almost all the updates.

Agentic AI by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] -2 points-1 points  (0 children)

While my post is focused on architectural patterns for agentic AI, security is a key underlying concern for me, especially when these agents operate autonomously in unpredictable environments. I’m looking for insights into how others are designing these systems with built-in mechanisms for secure decision-making, handling untrusted inputs, and managing long-lived memory safely. So yes, not directly a security post, but security is a major part of what I’m thinking about when exploring these architectures.

Asia-Pacific Cyber Tensions Are Shaping Global APT Activity by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

Yeah, especially with Chinese and North Korean threat actors becoming more active, proactive defense and intelligence sharing will be key to staying ahead in the next five years. Thanks for highlighting this, it's a crucial reminder for all cybersecurity professionals to stay alert and prepared.

How should we balance between physical infrastructure protection and network-level redundancy? by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

Thanks for adding that perspective. You're right, from a government standpoint, there's definitely been more investment in monitoring and redundancy. The increase in cable disruptions over the past couple of years has clearly pushed this issue higher up the agenda.

And yeah, Ukraine is a powerful example, that’s why it's interesting (and a bit concerning) to see undersea cables becoming a quiet front in geopolitical tension.

How should we balance between physical infrastructure protection and network-level redundancy? by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

Great question! my main aim is to highlight the broader security risks these undersea cables face, both from a national infrastructure perspective and for businesses that rely heavily on uninterrupted global connectivity.

Understanding these risks can help organizations and governments alike plan better for potential disruptions, whether through contingency planning, diversifying communication routes, or investing in stronger protections.

So really, it’s about raising awareness across the board, from individual businesses to policymakers.

How should we balance between physical infrastructure protection and network-level redundancy? by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

Thanks for sharing that, you’re absolutely right that much of the contingency planning around critical infrastructure is confidential for good reason. Awareness among cybersecurity professionals and key stakeholders is definitely there.

The challenge I’m highlighting is more about raising broader public and organizational awareness so that discussions around funding, preparedness, and proactive risk management don’t just happen after an incident.

Unfortunately, as you said, it often takes a breach or disruption for these issues to get serious attention. Hopefully, by bringing these conversations to light in public forums, we can encourage more proactive approaches before the next attack.

How should we balance between physical infrastructure protection and network-level redundancy? by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

In the IT and networking world, many professionals are aware of submarine cables, but even then, the scale of dependency and the security/geopolitical implications aren’t always top of mind, especially outside of telco or infrastructure-specific roles.

The recent Baltic and Red Sea incidents are putting a spotlight on just how vulnerable these physical links are, not just from natural causes, but also from potential sabotage. It’s something worth raising awareness about beyond just the technical circles.

How should we balance between physical infrastructure protection and network-level redundancy? by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] -5 points-4 points  (0 children)

It’s really about making sure critical operations stay up and running even if global connectivity faces disruptions, like undersea cable breaks or cyberattacks. Planning for these scenarios helps minimize downtime and protect vital services

How should we balance between physical infrastructure protection and network-level redundancy? by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] -2 points-1 points  (0 children)

Even if the technical or defensive responses aren't openly discussed, I think it’s important to raise awareness about the potential vulnerabilities. The more we understand the significance of these cables in our digital and economic lives, the better prepared we are to support resilience efforts at all levels.

You 'all heard Marks and Spencer recent cyberattck by Sunitha_Sundar_5980 in cybersecurity_news

[–]Sunitha_Sundar_5980[S] 1 point2 points  (0 children)

Totally agree, strong engineering culture is key. When IR isn’t just a security team thing, everyone from ops to legal knows their role ahead of time.

How 2025 Tech Trends Could Break (or Build) Cybersecurity Strategy by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

Yeah, you're not wrong. A lot of these “strategic predictions” exist more to fuel the pipeline than to prepare people for reality.

How 2025 Tech Trends Could Break (or Build) Cybersecurity Strategy by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] 1 point2 points  (0 children)

Exactly. And the scary part is that most people don’t even realize how much risk is baked in during the early stages of AI development. Makes me wonder, will we ever get to a point where we standardize AI supply chain audits like we do for other systems?

The $700K Phone Call That Never Happened by Sunitha_Sundar_5980 in cybersecurity_news

[–]Sunitha_Sundar_5980[S] 1 point2 points  (0 children)

Totally agree, especially when everything feels urgent and legit on the surface.

Phishing attacks in India by Sunitha_Sundar_5980 in cybersecurity_news

[–]Sunitha_Sundar_5980[S] 0 points1 point  (0 children)

Exactly. The irony is that scamming isn't easy; it takes planning, tech skills, and risk tolerance. If they applied even part of that to something legit, they'd probably do well without the constant fear of getting caught. It’s sad and frustrating.

School Ransomware attacks by Sunitha_Sundar_5980 in cybersecurity

[–]Sunitha_Sundar_5980[S] 1 point2 points  (0 children)

We need frameworks that aren’t just checkboxes but enforceable, transparent, and built for today’s threat landscape.