Indian Defense Minister Rajnath Singh has highlighted the significant impact of artificial intelligence (AI) and advanced technologies on military doctrines and defense preparedness, emphasizing their role in reshaping global security dynamics. Speaking at the Convocation Ceremony of the 80th Staff Course of Defence Services Staff College (DSSC) in Wellington, Tamil Nadu, on April 10, Singh pointed out that these advancements are redefining conflict and how nations establish and maintain strategic deterrence.
Singh explained that global geopolitics is being transformed by three primary forces: a heightened focus on national security, rapid technological evolution, and an increase in innovation. He described the power of technological innovation in combat as “breathtaking,” noting that AI and other emerging technologies are revolutionizing deterrence and warfare.
In discussing the ongoing Ukraine-Russia conflict, Singh remarked, “Drones have virtually emerged as a new arm, if not a transformative science.” He emphasized that the majority of soldier and equipment losses in this conflict can be attributed to drones rather than traditional artillery or armored vehicles. Furthermore, he highlighted how advancements in space technologies, particularly in Low Earth Orbit, are transforming military intelligence, surveillance, targeting, and communications, thereby elevating combat capabilities.
Singh stressed the necessity of developing a resilient, indigenous, and future-ready defense technological and manufacturing ecosystem. He stated, “Lessons of the ongoing conflicts teach us that building a resilient, indigenous, and future-ready defense technological & manufacturing ecosystem is not an option, but a strategic necessity.” This sentiment underscores the urgency for India to enhance its military capabilities in light of evolving threats.
Addressing the challenges faced by India, Singh noted that the country continues to confront security issues along its borders, exacerbated by proxy warfare and cross-border terrorism. “Armed Forces must operate jointly and remain future-ready in today’s ever-evolving multi-domain environment where cyber, space, and information warfare are as potent as conventional operations,” he asserted.
Singh reaffirmed the Indian government’s commitment, under Prime Minister Narendra Modi’s leadership, to develop a technologically empowered military capable of conducting integrated operations across multiple domains. He also discussed broader global issues, including the implications of ongoing tensions in West Asia and the Indo-Pacific region. In this context, he underscored the growing influence of non-conventional threats, such as climate change and natural disasters, on national and global security.
Moreover, Singh stressed the urgent need to advance military transformation to maintain operational effectiveness and strategic relevance in future conflicts. “The battlefield of tomorrow will require leaders who can adapt to unforeseen circumstances, leverage technology to their advantage, and come out with innovative solutions,” he said.
In a related discussion on cybersecurity, Dr. Dag Flachet, co-founder of Codific, provided insights into the implications of the Cyber Resilience Act (CRA) during a recent interview. He compared CRA to the General Data Protection Regulation (GDPR) in terms of regulatory complexity and its impact on organizations.
Flachet explained that while GDPR primarily focuses on the limitations around handling personal data, the CRA sets a minimum security standard for all products with a digital component, including software, B2C, and B2B products. He noted that CRA is built on the CE product safety labeling system, which requires companies to demonstrate compliance, potentially involving external verification or certified quality control systems.
“Millions of companies will need to upgrade or create an application security (appsec) program to comply with CRA,” Flachet stated. He elaborated on how the OWASP Software Assurance Maturity Model (SAMM) serves as an inventory of recommended organizational processes around application security, helping companies assess their readiness for CRA compliance.
According to Flachet, the CRA emphasizes a risk-based approach to cybersecurity, stating that products should possess an appropriate level of security based on identified risks. This necessitates the creation of application risk profiles to methodically categorize risk. He also highlighted the importance of protecting data confidentiality and integrity using state-of-the-art mechanisms while systematically analyzing potential risks.
Flachet pointed out that threat modeling and remediation are essential components of meeting CRA requirements. To close the compliance gap by 2027, he advised organizations to first identify gaps in their current processes using SAMM assessments or other maturity frameworks. “Referring to OWASP’s guidance is considered compliance with industry best practices,” he noted.
Reflecting on lessons from GDPR enforcement patterns, Flachet warned that fines for non-compliance with CRA are likely to start slowly and then accelerate as the principles become ingrained in the industry. “We can avoid risk, stress, and fines by doing our homework and having our house in order from the start,” he encouraged.
In conclusion, both Singh and Flachet underscore the critical importance of adapting to technological advances and regulatory changes in their respective fields. As military and cybersecurity landscapes continue to evolve, proactive measures and strategic foresight will be essential for nations and organizations to navigate the complexities of modern security environments.