Sandiip Bansal
[email protected]

Warfare in the Age of Drones and Cyber Threats

I remember when war was something we imagined through stories of tanks, uniforms, and frontline courage. But today, when I hear about conflict, I picture silent machines in the sky, blinking servers in control rooms, and commands being typed rather than shouted. The face of warfare has changed, and with operations like Operation Sindoor, this shift feels closer than ever.

Earlier this year, drones were intercepted in Jammu carrying weapons and narcotics across the border. Just days ago, authorities reported drone activity near sensitive installations in Punjab. These incidents are not isolated. They are reminders that war no longer always comes with noise—it often arrives quietly, through signals and networks.

Drones today are not just flying cameras. They are eyes, messengers, and in some cases, weapons. During the Ukraine conflict, low-cost drones were used to damage critical infrastructure. Even commercial drones were modified for military use. In India, we are beginning to see similar patterns emerge along our borders. Drones are used for surveillance, dropping payloads, and sending coded messages. They bring efficiency but also introduce a new layer of vulnerability.

I used to wonder why we were told to switch off lights during alerts. Now I understand it is not just about visibility. It is about electromagnetic silence, making it harder for machines to locate targets. One light left on could mean a traceable signal. One mistake could mean disaster.

This brings me to the invisible front—the cyber realm. Last year, India faced multiple cyber intrusion attempts on power grids and railway systems, believed to be orchestrated by foreign actors. These are quiet attacks, but their impact could be catastrophic. Data is now a weapon, and our defense must include digital warriors who understand how to protect it.

The changing face of warfare has shown us that conflicts today don’t just involve soldiers and borders—they affect ordinary people, everyday systems, and the very backbone of a nation’s infrastructure. One thing I’ve come to realise from observing recent wars is how vital civilian preparedness has become; in several countries, civilians are now being trained to respond to drone threats and cyber disruptions. I believe it’s time we took similar steps. We need dedicated programmes to equip key sectors—especially those linked to infrastructure and logistics—with the knowledge to detect and report suspicious activity. But awareness alone won’t suffice. We must invest in proper surveillance systems, well-positioned monitoring units, and dependable cybersecurity frameworks supported by the right kind of software. These tools act as our modern-day sentinels, and to build them, we need more than intent—we need a clear budget and strategic backing. Without proper funding, even the best ideas can’t take flight. More than ever, what we need is the determination to do better, expert minds to chart the way forward, and the right equipment to safeguard our future. Strength still matters, but now it must be matched by intelligence, innovation, and a national will to adapt.

We need regular security drills, cybersecurity audits, and a national mindset shift. Understanding technology is no longer optional. It is critical. Field Marshal Sam Manekshaw once said, “India cannot be defeated in a war. We may lose battles, but we will never lose wars.” His words still ring true, but the nature of battle has evolved. Our response must evolve with it. We cannot only rely on strength. We must rely on knowledge, readiness, and the people who defend not just borders but also firewalls.

Cybersecurity & AI: A Wake-Up Call for All of Us

Yesterday, I attended the ISMG Cybersecurity Week—a full house event that brought together some of the sharpest minds in security and technology. The agenda was packed, the energy was high, and most importantly, the conversations were real. Not just theoretical talks, but actual stories from the field.

With over 100+ CXOs present, we all had one thing on our minds: how to stay ahead of evolving threats in an AI-powered world.

Article content

🔐 The Core Message: Everything That Connects, Must Be Secured

During a panel discussion on “Identity-based Zero Trust: A User Case Perspective,” Bala Ramanan from Microland said something that stuck with me:

“Service accounts often become untracked and weakest point in our Securtiy Posture”

Third-party applications—no one really owns them. And that’s where attackers sneak in.

Let me explain why this is serious.

Even when we believe our main systems are locked down, attackers look for the smallest gap—and sometimes, that gap is something we never considered dangerous.

Here’s how:

Unsecured CCTV Cameras

Most CCTV cameras today are IP-based, which means they’re connected to your network. If they’re not updated or protected with strong credentials, hackers can break into them remotely. Once inside, they can move laterally across your network—jumping from the camera to more critical systems.

HVAC Systems (Air Conditioning Units)

These are often controlled using third-party software or remote access tools. In one real-world case, hackers used an HVAC vendor’s weak access control to gain a foothold into a major retailer’s network. Why? Because the HVAC system was connected to the same internal network as customer data.

Printer Cartridge Chips

Sounds bizarre, right? But attackers have found ways to program malicious code into printer chips. If a printer is connected to your Wi-Fi, that chip can be used to launch malware or gain deeper access into other devices on the same network. Many teams don’t even consider printers as a threat.

And it all circles back to one point:

Anything connected to your network, even if it looks harmless, needs to be secured and monitored.

Because in today’s world, hackers don’t go through the front door. They enter through a window that nobody remembered to lock.

Article content

The Danger of Outdated Systems

There was also a reminder about how old operating systems, like Windows 95, are sometimes still embedded into new infrastructure.

If these systems haven’t received security updates in decades, and are still connected to live networks, they become sitting ducks. Once attacked, there’s little anyone can do—because no new security patches exist for these old systems.

Article content

🤖 AI, False Alarms & Missed Threats

One of the most insightful parts of the discussion was about false positives.

Here’s what happens:

Your SOC team notices something suspicious.

These are blocked automatically as per the Policy and configuration. But if these false alarms are in thousands or even few 100s, The actual alarm goes missing in between.

That’s when the attacker breaks in.

This is not a failure of AI. It’s a reminder that we can’t rely on automation alone. AI models get trained over time. But if the security team stops digging into these so-called false positives, we miss the real threat hiding beneath the noise.

And let’s be honest — if you’re receiving over 1,000 false alerts a day, it’s natural to start ignoring them. But in doing so, we’re opening the gates to trouble.

Article content

💡 Takeaway: Be Proactive, Not Reactive

Security is no longer about building walls and hoping for the best. It’s about constant learning, questioning, and looking under the hood—even when the system says “it’s just a blip.”

Every connected device is a potential entry point. From HVACs to hand scanners. From outdated OS to camera chips.

The conversations at ISMG reminded us that cybersecurity isn’t just the IT department’s job anymore. It’s a business issue. A leadership issue. A survival issue.

Stay alert. Stay curious. And never assume anything is too small to matter.

If you’re attending similar events or passionate about where cybersecurity meets AI, let’s connect.

These conversations go beyond conferences—they shape how we build safer, smarter systems for the future.

Always learning. Always securing.

– Sandeep

Strong Password

Strong Password

Acceptable Methods to Create a Strong Password

  • Use a minimum of 10 characters. Generally, the more characters you can use, the harder a password is to be cracked or guessed.
  • Choose a password that is easy for you to remember but would be hard for another to guess. One useful approach is to use a sentence or saying to create a “passphrase” by using the first letters, capitalization, and special characters as substitutes. For example, “One ring to rule them all, one ring to bind them” may be used to create a passphrase like “1R2rtAor2Bt” that can be used as a very strong password.
  • Passwords must include at least three of the four following types of characters
  • English uppercase letters (A through Z).
  • English lower case letters (a through z).
  • Numbers (0 through 9).
  • Special characters and punctuation symbols (Example: _, -. +, =,!, @, %, *, &, ”, :, ., or /).
  • Do not use the following characters \ , ~  or < .
  • Do not use a space or tab.

Reuse of any of your last 5 passwords is prohibited over most of web/ corporate applications.

Tips for Creating a Strong Password

  • Avoid words, numbers, or known or public information associated with you. (e.g. Social security numbers; Names, family names, pet names; birthdays, phone numbers, addresses; etc.)
  • Avoid using your login name or any variation of your login name as your password. If your login is ‘fredrick’, do not use substitution or letter reordering. Examples would be ‘fr3dr1ck’, where the 3=e and the 1 (one)= i. Alternatively, do not use kcirderf (backwards) or add a digit to the beginning or end of the word (1fredrick or fredrick1).
  • Avoid using the same character for the entire password (e.g., ‘11111111’) or using fewer than five unique characters.
  • Avoid common letter or number patterns in your password (e.g., ‘12345678’ or ‘abcdefgh’). They are the first things hackers will test.
  • Substitution should not be used on common words or with common substitutions (e.g., 3=E, 4=A, 1=I, 0=O, etc).
  • When changing a password, change to an entirely new password. Do not just rotate through a list of favorite passwords.