Tech
|
Updated on 16 Nov 2025, 04:58 pm
Reviewed By
Abhay Singh | Whalesbook News Team
A recent Rubrik Zero Labs report indicates that approximately 90% of Indian organizations plan to increase their hiring of specialized professionals within the next year to bolster their digital identity management, infrastructure, and cybersecurity frameworks.
The primary driver for this significant hiring push is the accelerating adoption of artificial intelligence (AI). The report highlights that AI's rapid integration is leading to a surge in AI agents and 'agentic' identities, which are essentially automated software programs acting independently. This proliferation of non-human identities creates new security challenges and intensifies the spotlight on identity-based vulnerabilities and the preparedness for recovery from such threats for Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs).
Ashish Gupta, Managing Director, India & Head of Engineering at Rubrik, stated that attackers are increasingly targeting both human and non-human identities as the quickest route to critical systems and data, fundamentally altering the landscape of cyber defense in India.
The findings are based on a survey conducted by Wakefield Research among 1,625 IT security decision-makers from large organizations (500+ employees) across the US, EMEA, and APAC (including India) between September 18-29, 2025.
Impact This news suggests a significant increase in investment and focus on cybersecurity and IT infrastructure by Indian businesses. It signals robust growth potential for companies operating in the IT services, cybersecurity solutions, and cloud infrastructure sectors. The trend also indicates a heightened awareness of digital risks, potentially leading to stronger demand for advanced security technologies and services.
Rating: 6/10
Difficult Terms: AI agents: Automated software programs powered by artificial intelligence that can perform tasks autonomously or with minimal human intervention. Agentic identities: Unique digital identifiers assigned to AI agents, allowing them to be recognized, authenticated, and managed within IT systems, similar to how human users have digital identities. Identity-based vulnerabilities: Weaknesses in an organization's systems that can be exploited by attackers gaining unauthorized access through compromised or misused user accounts or system identities. Recovery preparedness: The state of being ready to restore essential business functions and IT systems quickly and effectively after a disruptive event, such as a cyberattack. CIOs (Chief Information Officers): Senior executives responsible for managing an organization's information technology operations and strategy. CISOs (Chief Information Security Officers): Senior executives responsible for ensuring the security of an organization's information assets and IT infrastructure.