logo
#

Latest news with #PantherunTechnologies

What's Holding Back India's Security Startups?
What's Holding Back India's Security Startups?

Entrepreneur

time5 days ago

  • Business
  • Entrepreneur

What's Holding Back India's Security Startups?

Investors worry about Indian entrepreneurs' ability to scale such a business internationally. There's also a lack of clarity on monetisation models and whether India can produce disruptive cybersecurity products for the world, says Srinivas Shekar, Co-Founder of Pantherun Technologies Opinions expressed by Entrepreneur contributors are their own. You're reading Entrepreneur India, an international franchise of Entrepreneur Media. The cybersecurity industry took a dramatic turn after the pandemic. With a sharp rise in malicious cyber activities, the demand for robust cybersecurity solutions has skyrocketed globally. According to estimates, the global cybersecurity market size was valued at USD 143.55 billion in 2024 and is projected to reach USD 225.21 billion by 2030, growing at a CAGR of 7.6 per cent during the period. On the other hand, India's cybersecurity market, as per IMARC Group, stood at USD 9.8 billion in 2024 and is expected to grow to USD 36.8 billion by 2033, exhibiting a CAGR of 15.8 per cent nearly double the global rate. Yet, despite this promising outlook, some investors paint a more sobering picture. "In India, there are over 1,400 cybersecurity companies, but only 235 are funded, and just 13 have reached Series B," said Prayank Swaroop, Partner at Accel. He believes India has the potential to mirror its SaaS success in the nearly USD 400-billion global cybersecurity market, but only if founders commit to playing the long game. So, what's stalling the funding momentum? Deepak Gupta, General Partner at WEH Venture Partners LLP, attributes it to market structure and global readiness. "In fintech, India has a large domestic TAM (Total Addressable Market), which can be largely served by domestic companies, hence the funding. In contrast, SaaS is a broader category than cybersecurity, and only countries with deep, specialised expertise like Israel tend to attract larger funding in this space," he noted. Meanwhile, Srinivas Shekar, Co-Founder of Pantherun Technologies, believes investor hesitation stems from a mix of uncertainty and complexity. "Interest in cybersecurity is definitely growing, but it's still catching up to the traction we see in SaaS and fintech. These sectors have well-established growth patterns and proven exits, which make it easier for investors to jump in. Cybersecurity is often seen as more technical and harder to evaluate," he said. "That said, the tide is turning. Investors are beginning to recognize the value proposition and the need for innovation in cybersecurity." Key investor concerns According to Gupta, a fundamental issue is that India has traditionally been a laggard in adopting cybersecurity solutions, making it harder for startups to gain traction domestically before going global. "Unlike the SaaS wave a decade ago,where Indian companies sold products 60 per cent cheaper via telesales, cybersecurity purchases, especially in mature markets, are complex and not just cost-driven. Enterprises already have around 40 cybersecurity products in their stack. So yet another point solution may not be compelling," he explained. Shekar agrees that scaling globally is a challenge. "Investors worry about Indian entrepreneurs' ability to scale such a business internationally. There's also a lack of clarity on monetisation models and whether India can produce disruptive cybersecurity products for the world," he said. Shekar adds that mature markets like the US and Europe show much higher adoption, primarily driven by proactive enterprise behaviour around compliance and data protection. "Governments in Europe are even framing laws to make cybersecurity mandatory, accelerating the industry's growth." Still, Shekar remains optimistic about India's trajectory. "There's increasing awareness about the importance of cybersecurity, and we're seeing more structured interest and adoption from forward-looking Indian companies. The momentum is picking up steadily."

The Quantum Conundrum: Inside The Race To Future-Proof Cybersecurity
The Quantum Conundrum: Inside The Race To Future-Proof Cybersecurity

Forbes

time01-07-2025

  • Forbes

The Quantum Conundrum: Inside The Race To Future-Proof Cybersecurity

Srinivas Shekar, Founder and CEO, Pantherun Technologies. Most people don't think about it daily, but data encryption is vital to our lives. Secure encryption technology is used to protect the data on your mobile device, laptop, hard drive and the cloud, as well as anything sent by text or email, just to scratch the surface. Any valuable data that is digitally stored, sent or spent is likely to be encrypted. That turns out to be essential for secure finance, defense, telecom, health, commerce and many other services. Fortunately, those services—and all that data—are very safe, thanks to Advanced Encryption Standard (AES) 256, the gold standard of data encryption today. How safe? Well, to systematically try every possible key in an AES-256 encryption until the correct one is found (known as a 'brute force' attack), a hacker would have to try up to 1.16×1077 possibilities. Written out, that number looks like this: 116,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 If a hacker tried one potential decryption key per second, it would take them three hundred sixty-eight quattuordecillion years to attempt all possible keys. That is 3.6×1041 million years (360, followed by 42 zeroes)—about 1,060 times longer than the age of the known universe. So, pretty darn safe. But in this world of rapidly accelerating technology change, cybersecurity leaders and end users alike are starting to ask, "Safe for how long?' The reason is quantum computing. How Quantum Computing Challenges Encryption Fully functional quantum computers capable of undermining today's strongest encryption methods are not expected for at least 10 years (and probably quite a bit longer) However, there are already quantum formulas like Shor's Algorithm, which uses quantum superpositioning to try an exponential number of possibilities all at once, and Grover's Algorithm, which leverages probability hacks to reduce the number of guesses needed in a brute force attack to the square root of the total number of possible solutions. With Grover's algorithm, for instance, a 256-bit key can be simplified down to a 128-bit key, at which point it is easier to successfully guess the correct key. (Roughly, it is like picking an unknown card out of a full deck in just seven guesses, rather than trying all 52 cards, one by one.) While that is still not a big enough advantage to threaten AES-256 encryption today, those responsible for data security do need to start planning for its eventual vulnerability. Here's why: • AI: Although quantum computing is probably at least 10 to 20 years away, AI may accelerate its arrival more than we imagine, by developing quantum algorithms, improving qubit layouts, reducing error rates or discovering materials to solve quantum hardware issues. • Harvest Now, Decrypt Later: Playing the long game, some thieves are stealing encrypted data today to access it in the future. Even currently 'invincible' encryption standards like AES-256 may not be enough to permanently protect highly valuable data. • Rapid Access: When quantum computing does come into force, the technology could be consumerized very quickly, giving any number of bad actors ready access to encryption-weakening capabilities. How To Prepare Today For The Post-Quantum Future According to a U.S. security memorandum, quantum computing will 'jeopardize civilian and military communications, undermine supervisory and control systems for critical infrastructure and defeat security protocols for most Internet-based financial transactions.' Organizations responsible for data security cannot afford to wait for this tsunami of threats to arrive before building a new sea wall. But what can organizations do today to begin solving the quantum conundrum? 1. Upgrading Encryption: If your organization is still using less secure encryption methods like RSA, DH, DSA and ECC, you must urgently update your security protocols. These methods are already vulnerable to Shor's algorithm and should be replaced as soon as possible. Even AES-128 will likely no longer be secure enough for high-value data when quantum computing arrives. 2. Post-Quantum Cryptography (PQC): PQC employs hard mathematical models like lattices and multivariate equations to make encryption quantum-resistant. It is already being used by companies like Google, Microsoft and IBM. But many PQC solutions require enormous computing power and introduce latencies, making them impractical for low-compute or real-time scenarios. 3. Out Of Band Solutions (OOB): OOB methods transmit keys outside of the communication channels typically used to send encrypted data—for instance, by satellite or physical transfer on a USB key. Because they are not on the same digital network as the data, they cannot be broken by quantum computers, even in the future. However, scaling OOB is challenging. Satellite transmission is limited by infrastructure, and manual transfer methods are subject to human error. 4. Quantum Key Distribution (QKD): QKD is a kind of OOB key transfer solution accomplished by firing single photons representing binary code over fiber optic cable. Since measuring any quantum state automatically disturbs it, interference is impossible without detection, making QKD theoretically unbreakable. However, QKD requires specialized hardware, has limited range and is prohibitively expensive for most industries. 5. Keyless Encryption: One more quantum-resistant approach to key exchange is to not have a key in the first place. With keyless encryption, keys are assembled from user data, key data fragments or using ephemeral code, which obfuscates decryption data in such a way that no quantum algorithm could ever guess it. Randomly located pieces of transmitted data can be used, for example, to form temporary keys that can be read only by an authorized receiver using the same technology. This approach solves the quantum conundrum at a low cost and with zero latency. As a relatively new solution, however, keyless methods currently lack widespread standards, posing challenges for interoperability and regulatory compliance. To take full advantage of this novel solution, greater adoption is needed by standards organizations and industry groups. Conclusion Most of us rarely think about data encryption, as it quietly impacts nearly every part of our digital lives. AES-256 is incredibly strong today, but with both AI and cybercrime accelerating rapidly, the clock is ticking fast. Organizations must act now to solve the quantum conundrum—or risk waking up some day to find their most sensitive data suddenly exposed. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store