Securing Critical Infrastructure: The Radical Possibilities of Facial Recognition Systems

Securing critical infrastructure is important to protect the physical and digital boundaries of any economy. Security advisors and experts around the world are constantly engaged in strategising and devising policies for efficient incident detection and response protocols. The key motivation for such intricate planning is not only to secure the boundaries but also to safeguard resources, people, and information through and through.

 To break it down, the National Institute of Standards and Technology (NIST) defines Critical Infrastructure as ‘systems and assets, whether physical or virtual, so vital to a country that the incapacity or destruction of such systems and assets would have a debilitating impact on political security, national economic security, national public health or safety, or any combination of those matters.’ Some of the most crucial sectors for a country are:

  Homeland security
 Water processing
 Critical manufacturing

 Resources are dedicated to preventing any disruptions in the functioning of these assets. This is essential to maintain socio-economic stability and keep safe from threats and adversities, operational failures, and global incidents. These critical sectors constantly remain vulnerable to risks and uncertainties, threatening the peace and balance of a country and catching the attention of malicious actors.

 Events of crime and vandalism endanger peace, creating a sense of insecurity and unrest among the masses. Evidently, the damage to public property and resources is immense and affects the whole country. Sensitive information and data leaks due to weak cybersecurity, breaches, and unauthorised access compromise the country’s global communication channels, leading to the loss of critical digital resources. According to a 2023 report by Cybersecurity Ventures, the global annual cost of cybercrime is projected to reach US $10.5 billion by 2025, stating cybercrime to be the most immediate global threat. In another example, break-ins and security incidents in manufacturing, energy, and logistics units are greatly detrimental to operational flow and hence, disrupt the national and international supply chains.

 The need of the hour is to establish a more reliable, accurate, and foolproof security system competent in safeguarding critical infrastructure. With the increasing footprint of technology in security, the best alternative is a smart solution that encompasses the capabilities of a video surveillance system, access control system, incident detection, and alert protocols.

 Facial Recognition Technology
With 64% of countries using facial recognition systems (FRS), it is among the top three AI surveillance technologies adopted across the world. It is not limited by geographical boundaries, electronic configurations, or physical proximity. For securing large and small spaces, as well as physical and virtual premises, facial recognition technology has emerged as a phenomenal player in the security ecosystem. The following qualities set facial recognition technology (FRT) apart from other technologies:

 Accurate Identification
FRT has achieved more than 99% accuracy in the identification and verification of an individual’s profile from their face image. This also indicates that the chances of false results are nearly zero. As a virtue of this accuracy and ever-evolving algorithms, the presence of a person of interest can be quickly tracked and addressed.

 Improved Video Surveillance
Facial recognition expands the capabilities of a standard video management system (VMS), which is an indispensable part of perimeter security. It enriches existing VMS with intelligent analytical features, like premises mapping, incident detection, smart tracking, micro surveillance and control, etc. This enrichment increases the reliability of security infrastructure and strengthens protective measures.

 Efficient Access Control
Access control mechanisms are set up to monitor and regulate access to sensitive areas, critical assets and premises, hazardous manufacturing units, or even control rooms. Access control systems facilitated with facial biometrics protect sensitive resources and areas from unauthorised access on account of identity theft or tailgating. This is not only limited to the physical premises but digital assets as well, such as servers, cloud resources, and data centres.

Quick identification, incident detection, and archived recordings support the security staff in monitoring and controlling incidents. As soon as an unidentified person is detected by the FRS or a potential breach is attempted, immediate alerts are sent to the security control interface calling for prompt response.

 Liveness Detection
FRS is powered by advanced technology and algorithms supported by artificial intelligence, and it is constantly evolving with endless possibilities. One of its key capabilities is liveness detection. It enables the system to differentiate an image from an actual person, preventing the risks of identity theft and synthetic identities. Thus, helping strike security vulnerabilities and build a more robust and protective infrastructure.

 Accessibility Benefits
Unlike other authentication methods, facial biometrics is not limited by situational constraints. FRS completes the authentication process of an individual as soon as they step into the range of the camera, defying proximity challenges. The face image serves as an added layer for access control, surpassing the limitations of physical cards and alphanumeric passwords. The system works seamlessly across geographical areas, offering high accuracy and uniformity.

The operational efficiency of a nation is undoubtedly dependent on its critical infrastructure and how well it is secured and maintained. In order to achieve a stable socio-economic environment, strong security and response protocols are required to be established at a foundational level. And facial recognition systems offer enormous possibilities for a conventional new world with more secure boundaries, integrated global operations and a safer environment where mutual association thrives.

 “Facial recognition stands at the forefront of securing critical infrastructure in the Asia Pacific region. It is highly accurate and could be seamlessly integrated with existing surveillance systems and access controls. Facial biometrics sets a new standard in safeguarding national assets and maintaining socio-economic stability amidst evolving threats,” said Oleg Kurochkin, Business Development Director, APAC region, RecFaces.

Dhirubhai Ambani University appoints Prof. (Dr.) Avinash Dadhich as the Founding Director

6th August, India: Dhirubhai Ambani University (DAU) is pleased to announce the appointment of Prof. (Dr.) Avinash Dadhich as the Founding Director to lead the establishment of the proposed School of Law.

Dr. Dadhich’s blend of diverse experience, covering academia, legal consultancy, and practice, focuses on the law and regulation of AI, data privacy, and competition law.

dhirubhai ambani

Dr. Dadhich expressed his enthusiasm about joining DAU, stating, “I am delighted to join DAU at this pivotal time when it is transforming into a multi-disciplinary university through the addition of various disciplines, including the School of Law. Late Shri Dhirubhai Ambani always stood for excellence on a global scale. I am excited to work with the DAU team on this journey to build a world-class institution in legal education.”

Invited by the USA government as an Antitrust IVLP Fellow, Dr. Dadhich received full scholarships for his Ph.D. from UK, LL.M. from France, and earned LL.B. from Delhi University.

In his academic career, he has held senior roles, including Director at Manipal Law School, MAHE, Bengaluru, and Dean at IFIM Law School, Bengaluru. He was invited as a visiting research fellow at the Max Planck Institute of IP and Competition, Munich; the Institute of European Studies, Brussels; and King’s College London.

In addition to being a legal scholar, Dr. Dadhich has also worked as an advocate in the Supreme Court of India and has consulted on legal matters at Deloitte and EY, Gide Loyrette Nouel, Paris, White & Case, Brussels, and the Competition Commission of India.

ASPA’s Puneet Maithani Delivers Keynote at ASIA Security Conference on Anti-Counterfeiting and Brand Protection

New Delhi, India – August 06th, 2024 – Puneet Maithani, Associate Director of Industry Affairs at the Authentication Solution Providers’ Association (ASPA), delivered a compelling keynote address titled ‘ASPA: Leading the Fight Against Counterfeiting and Ensuring Product Authenticity’ at the ASIA Security Conference & Exhibition | Anti-Counterfeiting, Trademark & Brand Protection.

puneet

In his keynote, Puneet emphasized the urgency of the counterfeiting problem and highlighted ASPA’s mission to combat it through innovative authentication solutions. He detailed ASPA’s recent achievements, including launching its Middle East and Africa (MEA) chapters, and outlined the association’s four key focus areas: Awareness, Advocacy, Research, and Innovation.

Puneet discussed ASPA’s initiatives to raise awareness about counterfeiting, emphasizing the need to educate stakeholders and the public. ASPA’s programs have been crucial in spreading knowledge and fostering a proactive approach to combating counterfeit goods.

Advocacy and industry partnerships are essential components of ASPA’s strategy. Puneet spoke about collaborations with industry leaders to develop best practices for anti-counterfeiting. He mentioned ASPA’s initiatives, including panel discussions and sector-specific webinars, which engage key stakeholders and address industry issues. These webinars have been vital in reaching a wider audience. Puneet also highlighted ASPA’s flagship event, the Traceability & Authentication Forum, and the Counterfeit News Repository, a resource tracking media-reported counterfeiting incidents.

Research is another cornerstone of ASPA’s efforts. Puneet showcased studies and reports produced by ASPA, including the ASPA-CRISIL State of Counterfeiting report in India, which provide valuable insights to inform strategies against counterfeiting.

Innovation in anti-counterfeiting technologies was a focal point of the keynote. Puneet highlighted the advanced solutions ASPA members offer, such as security design, holograms, security inks, track and trace systems, NFC/RFID, and blockchain technologies, protecting over 15,000 brands worldwide.

In a related keynote, Mr. Manoj Kochar, ASPA President and IHMA Board Member, presented on the newly launched Security Image Register. The presentation, titled ‘Security Image Register – The Next Frontier for OVD Copyright,’ introduced this innovative tool designed to enhance the protection of Optical Variable Devices (OVDs) through advanced image registration technology.

In closing, Puneet emphasized the benefits of ASPA membership, which provides access to the latest technologies, research, and a robust network of industry experts—resources invaluable for companies in the fight against counterfeiting.

The ASIA Security Conference & Exhibition is a premier event that brings experts, brand owners, and policymakers together to discuss strategies for protecting trademarks and brands from counterfeiting. Puneet’s keynote underscored the critical role of awareness and the indispensable support of brand owners in the ongoing battle against counterfeit goods.

Trane Technologies Reports Strong Second Quarter Results and Raises 2024 Revenue and EPS Guidance

India, Aug 06, 2024 – Trane Technologies plc, a global climate innovator, today reported diluted earnings per share (EPS) from continuing operations of $3.33 for the second quarter of 2024. Adjusted continuing EPS was $3.30, up 23 percent. Second-Quarter 2024 Results  Financial Comparisons – Second-Quarter Continuing Operations   $, millions except EPS Q2 2024 Q2 […]

The post Trane Technologies Reports Strong Second Quarter Results and Raises 2024 Revenue and EPS Guidance first appeared on Business News Week.

IEX POWER MARKET UPDATE, JULY’24

Mumbai, 06 August 2024: Indian Energy Exchange, India’s premier electricity exchange, achieved the highest ever total volume (including certificates) of 13,250 MU in July 2024, marking a ~56% year-over-year increase. The electricity volume at 10,093 MU, increased 29% YoY. Green electricity volume during the month at 1 BU, grew 259% YoY. The renewable energy certificates […]

The post IEX POWER MARKET UPDATE, JULY’24 first appeared on Business News Week.

BIOFACH INDIA 2024, NATURAL EXPO INDIA, and MILLETS INDIA Launch at IEML, Greater Noida

New Delhi, 06 Aug 2024 – Organised jointly by Nuernberg Messe and APEDA (Agricultural and Processed Food Products Export Development Authority), under the Department of Commerce, Government of India, BIOFACH INDIA 2024 co-located with NATURAL EXPO INDIA and MILLETS INDIA took off to a great start, all set to redefine the landscape of organic, natural […]

The post BIOFACH INDIA 2024, NATURAL EXPO INDIA, and MILLETS INDIA Launch at IEML, Greater Noida first appeared on Business News Week.

Enhancing Cloud Security: Strategies Against Unexpected Risks

Harish Kumar

Harish Kumar GS, Head of Sales, India and SAARC, Check Point Software Technologies

In the dynamic and swiftly changing digital world, more organizations are turning to cloud-native solutions to fuel their business growth. Projections indicate that the cloud security market in India will grow by 31.45% between 2024 and 2029, reaching a market size of $125.70 million by 2029. According to a report by NASSCOM, cloud technology is set to comprise 8% of India’s GDP by 2026, potentially contributing between $310 and $380 billion to the economy and creating 14 million jobs by that time. With a dedicated and strategic approach, cloud investment could see an annual growth rate of 25-30% from 2022 onward, reaching $18.5 billion, thereby enabling India to fully leverage the cloud market.

Despite these promising prospects, the increasing dependency on cloud infrastructure necessitates stronger security measures. A recent survey reveals that 52% of Indian organizations consider cloud-related threats to be their primary cyber risk concern over the next year. This highlights the urgent need for comprehensive cloud security solutions to protect sensitive information and maintain the integrity of cloud environments. Cloud native security measures are primarily focused on safeguarding against identifiable threats, employing innovative technologies like big data and AI to monitor and preempt potential attacks. Despite these efforts, however, no system can ever be completely impervious to threats. Even with state-of-the-art protections in place, cloud security is never truly good enough if there remain unidentified vulnerabilities.

Security experts focus on known risk indicators.

Our industry typically focuses on examining potential avenues for exploitation by attackers and identifying methods for avoiding errors in our coding. However, the most detrimental attacks are those that catch us completely unaware, and we only become aware of their presence when they are already in the process of attacking us.

A brief history of cloud so far

It started around 12 years ago with our new ability to run much stronger algorithms.

  • We were finally able to collect and analyze data in a big way… in fact that’s why we called it: big data.
  • But we also needed a way to store this data in a cost-efficient way and hence virtual networks were born.
  • Meanwhile with mobile applications blowing up all over the world, data suddenly needed to move around, be everywhere… and so, we got cloud ISPs. Cloud computing challenges were addressed by running everything as scalable code that’s broken down into services that run on virtual machines that become active on call.
  • By this time, Machine Learning was introduced to optimize our data and generate deep insights.
  • Kubernetes was introduced to provide further granularity for coding and running services.
  • Crypto drove to the rise of GPU processing and generative AI became a thing.
  • And finally, it was COVID that gave the cloud its biggest push.

Remote end points, data accessed from everywhere, and the speed of technology all require cloud services. Today, businesses small to large are already on the cloud or getting there.

The cloud is not a problem – it’s a solution.

The Cloud has become an integral part of our daily lives, having matured to a point where its presence is ubiquitous. As cloud professionals, we often find ourselves engrossed in resolving its associated challenges, and it is easy to forget just how magnificent the cloud truly is. The cloud has afforded us numerous benefits and possibilities that were once impossible to imagine. Admittedly, it has also presented its fair share of problems. However, it is imperative that we realize that the cloud is not the problem; it is the solution. By harnessing the benefits of the cloud, we can improve security measures in the coming years, and amplify what we do to the next level.

It’s all about data exchange:

Applications are based on two main channels of data exchange: The cloud front door, where users submit requests for various services from the cloud application via public internet, mobile networks, and VPNs. Then there’s the service door – from which code and data is continuously pushed into to keep the application running. So, basically, we protect the wiring. We try to understand each request that is made, and we have a set of tools to confirm that the exchange is safe.

Each user request is a potential threat….

But this wealth of data exchange through various channels and hybrid clouds… can also mean trouble. If you look at this simplified supply chain diagram, you can immediately see the many components that exchange data and can potentially serve as backdoors for hackers to penetrate your environment.

Each time data is exchanged between components, there is a risk that the exchange will be breached or manipulated. Add to that, the fact that you rely on so many 3rd party feeds and services exchanging data, that may also have their own set of vulnerabilities.

A cloud with many icons

Description automatically generated

We prepare our troops for battle and do everything you we can to protect our assets in the field… but our main target should be to avoid the war in the first place. To safeguard our business, we employ various security measures such as WAF for the front door, CSPM and workload protection for the cloud contents, and code scanning and network security for the end point. With these measures in place, we feel confident that we can handle any known risks. However, we cannot discount the possibility of unknown risks, which is why we remain vigilant and adaptable in our approach to security.

Let’s try to understand what we are protecting ourselves from starting with some basic definitions:

Known vulnerabilities means either stuff that we do ourselves such as:

  • misconfigurations or hidden credentials,
  • known vulnerabilities – which may allow malicious activity until patched and…
  • dynamic risk indicators based a wide database of attack indicators such as suspicious behavioral patterns, malicious IPs, attack patterns etc.
  • By continuously looking for these issues and indicators we can provide posture, protection, and zero-tolerance across your application network.

Unknown vulnerabilities may be:

  • undiscovered software vulnerabilities, that may cause a software component to deviate from its original assignment and allow access or manipulation.
  • vulnerable backdoors, some by design (for example a forgot password function) and unintentional backdoors – discovered by malicious actors or
    and finally, simply new attack techniques and methods which hackers are busy inventing all the time and we don’t know about yet…
  • Because we don’t really know how to protect against these unknown risks – they are of-course exactly what attackers are looking for and that’s also why zero-day exploits have become so common.

CVEs are Unknown Until We Have a Signature

The basic way in which we communicate unknown vulnerabilities is by using CVEs or Common Vulnerability and exposure – it’s our way to keep security teams updated with the latest problems and often with their solutions and patches.

In 2022 alone, over 25,000 new CVEs were discovered by internet users worldwide according to Statista – that’s the highest reported annual figure to date. This means that on average, our poor security guy would start his morning with 68 CVEs, one third of which would be high or critical risks. That’s 68 NEW CVEs every single day of the year.

But it’s also interesting to point out that resolving a CVE takes 65 days on average, so until there is a stable patch to fix the core issue the only line of defense you have is you WAF, and your WAF is blind to unknown attacks until a signature is released.

Let’s continue this story focusing on log4shell as our main use case.

Log4Shell is a great example because it ticks all the boxes:

  • Log4j is a java logging library that is used by hundreds of millions of machines. There can hardly be a large application that does not utilize it in some way or form.
  • It was hacked over 800,000 times in its first 72 hours, both because it was easy to hack and allowed attackers to gain deep access.
  • It’s almost impossible to evaluate the number of attacks since 2021 but we do have an estimate of over 1.5 billion dollars’ worth of damages so that should give you some kind of indication.
  • And interestingly, 1 out of 4 apps still have problematic log4j versions, because you couldn’t get to all of them even if you tried.
  • A pink background with white text and symbols

Description automatically generated

Log4shell also shows how things can get worse before they improve.

  • In this case the vulnerability was discovered on November 24th and assigned a CVE number two days later.
  • A week later in December first, there had already been evidence of exploitation in the wild.
  • The real mess started on December 9th – which was the first time Apache publicly disclosed the vulnerability, this included a patch for the affected log4j2. I seemed that organizations could start their mitigation immediately; however, it took another five long days for Apache to realize that the even more popular log4j1 was in fact vulnerable as well, so patching had to start over.
  • To make things even more complicated and additional CVE was published on Dec 17th disclosing many more exploit scenarios… in fact over a month later, issues and variants were still being disclosed, and only after 35 days, security teams were finally able to start patching critical assets. Now it’s simple math here folks – if it took 35 days to contain and on average it’s going to take you another 65 days to remediate, that means you are exposed to the worst kind of attacks for a hundred days!! That’s a lot of days.
  • An attacker can easily attach a malicious string to a simple login or search request taking advantage of a java logging vulnerability.
  • A diagram of a timeline

Description automatically generated with medium confidence

Log4Shell is an exploit of Log4j’s “message substitution” feature—which allowed for programmatic modification of event logs by inserting strings that call for external content. The code that supported this feature allowed for “lookups” using the Java Naming and Directory Interface (JNDI) URLs. So, all an attacker will need to do is to insert text with embedded malicious JNDI URLs into requests to software using Log4j in the LDAP logging Server—these URLs result in remote code being loaded and executed by the logger. Attackers have been exploiting the vulnerability to compromise virtualization infrastructure, install and execute ransomware, steal system credentials, take broad control of compromised networks, and exfiltrate data.

From Static Analysis to contextual AI

So, was there a way to block log4Shell? The simple answer is YES. And the way to do that is of course by using machine learning and artificial intelligence to their fullest potential.

In the past AI has allowed us great things – it started with the ability to optimize the way we handle large amount of data or to improve processes… and with the rise of CNAPP and data consolidation we can now look at our threat data as a whole and derive insights that help us improve and scale our security.

But what if we could use the same AI to look inwards rather than outwards? If we gain a deep understanding of the application’s normal behavior, we should be able to detect anything that falls outside of that norm and simply block it!

Legrand Empowers Sea Sakthi Team to Win Townhall Cup at Monaco Energy Boat Challenge 2024

Mumbai, August 6th, 2024: Group Legrand India, a global leader in electrical and digital building infrastructure, proudly sponsored ‘Team Sea Sakthi’, the only Indian team that represented the country in the 11th Monaco Energy Boat Challenge 2024, organized by the Yacht Club de Monaco. Comprising 14 innovative students from Kumaraguru College of Technology, Coimbatore, Tamil Nadu, the team was dedicated to pioneering alternative power sources for marine vessels, championing a carbon-free future for the seas. Legrand’s unwavering commitment to innovation and sustainability was reflected in its support for these visionary students.

YALI

In their third consecutive participation, Team Sea Sakthi unveiled Yali 3.0, a cutting-edge boat featuring a twin propulsion system, custom-designed propellers, and an AI-driven navigation system with integrated Yacht OS. The team advanced to the quarterfinals in both the championship and slalom races on the event’s final day, securing multiple accolades including the Innovation Prize, the Design Prize, the Communication Prize, and the coveted Townhall Cup. Finishing 6th overall, Sea Sakthi brought immense pride to their institution and nation.

Beyond their impressive performance, the Sea Sakthi team had spearheaded sustainable technology projects. Their first initiative focused on developing low-cost, solar-powered autonomous boats to clean trash from Indian lakes, which enhanced water quality and public health. Additionally, they innovated cleaner, more efficient fishing boat technology to address the limitations of petrol-powered fishing boats, which had strained budgets, limited range, polluted waterways, and posed safety risks.

Mr. Tony Berland, CEO and Managing Director, Group Legrand India remarked, “We were thrilled to support these exceptional students in representing India for the third time at the Monaco Energy Boat Challenge 2024. Their dedication to sustainability and a thriving blue economy aligned perfectly with Legrand’s commitment to achieving carbon neutrality by 2050 and our broader environmental and community welfare initiatives. Such synergy of ideals paved the way for progress and prosperity.”

Group Legrand India’s support for Team Sea Sakthi underscored its dedication to fostering innovation and sustainability, both within its organization and in the wider community.

Tata Passenger Electric Mobility and Tata Power Renewable Energy Team Up for Zero-Emissions Mobility in India

Bengaluru, August 6, 2024: Tata Passenger Electric Mobility Ltd. (TPEML), the market leader in passenger electric vehicles in India, and Tata Power Renewable Energy Ltd. (TPREL), a leading entity in India’s renewable energy landscape, a subsidiary of The Tata Power Company Ltd., have joined hands to drive zero-emissions mobility in India through a combined solution of Electric Vehicles and Solar Rooftop Systems. Through this collaboration, TPEML will enable customers to get a solar rooftop system installed through TPREL. In addition, both companies will promote EVs / EV Charging and Solar Rooftop Systems to their respective customers to drive awareness of the benefits of solutions.

Electric Vehicles (EVs), which have zero tailpipe emissions, and solar power systems, which generate emissions-free electricity, are both key enablers in India’s journey towards Net Zero emissions. The Government of India has been supporting EVs through multiple initiatives over the last several years, and the recently launched PM Surya Ghar Muft Bijli Yojana aims to provide subsidized solar rooftop installations to 1 crore households.

While both EVs and Solar Rooftop Systems deliver an independent business case for customers, combining the two solutions delivers several additional benefits to customers, such as:

· Reducing the total cost of ownership for EVs

· Reducing the electricity bill for EV customers

· Accelerating the payback for solar rooftop owners who buy an EV

· Providing 100% emissions free power for EVs

In addition, combining Solar Rooftop Systems with EVs de-couples the well-to-wheel emissions of EVs from the grid mix, thus offering a much faster path towards net zero emissions for the transportation sector.

Commenting on the collaboration, Mr. Shailesh Chandra, Managing Director, Tata Passenger Electric Mobility Ltd. and Tata Motors Passenger Vehicles Ltd. said, “India’s net zero journey can only be achieved by switching to EVs and renewable power. We see significant synergies between the customers of EVs and solar rooftop systems. Over 90% of EV customers use home charging and nearly 30% of our EV owners are already using Solar Rooftop Systems. Combining forces with Tata Power Renewable Energy Ltd., we intend to democratize zero-emissions mobility and decouple EVs from the grid, while reducing running costs for customers.”

Dr Praveer Sinha, CEO&MD Tata Power, said, “Combination of Solar rooftop and EV is a promising, cost-effective, sustainable solution for India and hence naturally complementary. Both solutions appeal to the same set of eco-friendly and value-conscious customers. We are excited to collaborate with Tata Passenger Electric Mobility Ltd.  to drive greater adoption of Rooftop Systems and EVs and provide discerning customers with an opportunity to contribute to reducing emissions while saving money.”

Tata Power is fuelling the growth in the solar rooftop sector through its nationwide campaign on ‘GharGharSolar, Tata Power ke Sangh’.  Tata Power plans to aggressively promote solar rooftop adoption through its extensive network of over 700 channel partners and retailers to cover every nook and corner of the country. Notably, the company has served over 1,00,000 satisfied customers across India. Tata Power has installed a substantial number of 101,924 home chargers and 5,600 public chargers across India.

Tata Power Renewable Energy Ltd. through its extensive EV charging network of 5,600 public charging points is strategically positioned across India to provide solar-powered charging solutions. Present across prominent highways and diverse locations such as hotels, malls, offices, hospitals, residential complexes, etc., TPREL is playing a pivotal role in accelerating e-mobility adoption across the country.

API & ICP issue practical guidelines for doctors to enhance Hypertension care in India

August 5, 2024, National: The Association of Physicians of India (API) in collaboration with the Indian College of Physicians (ICP) have released the Guidelines on the Management of Hypertension in Indian Patients with Type 2 Diabetes Mellitus (T2DM). These guidelines address the pressing need for a detailed, region-specific protocol to manage the growing dual burden of hypertension and diabetes in India.

Hypertension and diabetes are among the leading lifestyle diseases in India, contributing significantly to morbidity and mortality. Studies indicate that over 50% of hypertensive patients in India are also diagnosed with T2DM, highlighting a significant overlap that poses unique challenges in patient care. The co-occurrence of these conditions amplifies the risk of cardiovascular complications and accelerates the progression of renal disease, making effective management strategies critical. Also, majority of these diseases are diagnosed and managed at the primary care level in India and thus there is a need for detailed guidelines charting out the entire management protocol, especially in Indian patients.

“While global guidelines provide a framework for managing hypertension in T2DM, the Indian and Southeast Asian populations differ significantly from Western populations in terms of ethnicity, clinical challenges, and drug responses. Recognizing this gap, the API and ICP have collaborated with leading physicians, cardiologists, diabetologists, and endocrinologists to develop a management protocol specifically for Indian patients. The guidelines emphasize the importance of early detection, comprehensive assessment, and a multi-faceted treatment approach” said Dr. Jyotirmoy Pal, President Elect (2025), API

Hypertension in individuals with T2DM greatly increases the risk of cardiovascular complications like heart disease, stroke, and peripheral artery disease. Assessing target organ damage and overall cardiovascular risk is essential to guide treatment intensity and preventive measures. Regular screening for microalbuminuria is recommended to identify those at risk of kidney dysfunction and future cardiovascular disease. Using specialized risk scores developed for individuals with diabetes is preferred over general population risk scores for more accurate cardiovascular risk assessment.

Given the high cardiovascular risk in T2DM, the guideline recommends a treatment of dual antihypertensive therapy, specifically combining Angiotensin Receptor Blockers (ARBs) with Calcium Channel Blockers (CCBs) for their effectiveness in reducing BP and safeguarding against cardiovascular complications Contd.

A notable inclusion in the 2024 guidelines is the recommendation of newer CCBs, with a specific focus on Cilnidipine. Introduced in India in 2007, Cilnidipine has shown promise in offering multiple benefits, not just in reducing BP, but also in protecting crucial organs, especially the kidneys. The guidelines suggest combining Cilnidipine with ARBs to maximize these benefits, while also considering patient-specific factors and comorbidities.

Additionally, Renin-angiotensin system (RAS) blockers should be integral to the treatment regimen, given their proven efficacy in randomized controlled trials (RCTs) for preventing and slowing the progression of diabetic kidney complications. It also recommends use of Newer anti-diabetic agents like SGLT2 inhibitors and GLP-1 receptor to improve glycemic control as well as confer macro & micro- vascular protection.

The API-ICP also recommends conditions where the patients should be further referred to specialists for better management of the disease.

One of the key features of the new guidelines is the emphasis on using multiple methods to detect and measure hypertension, including home blood pressure (BP) monitoring. This approach empowers patients to take an active role in managing their condition, improving adherence to treatment and long-term outcomes.

In addition, the guidelines advocate for the integration of lifestyle modifications to enhance treatment outcomes. For the first time, the ancient Indian practice of yoga is recommended as an adjunct therapy for managing hypertension in T2DM. Doctors are advised to recommend Yoga’s holistic benefits to patients for overall health outcomes.

Healthcare practitioners across India and beyond are encouraged to adopt these guidelines to enhance patient care and ensure the effective management of hypertension in diabetic patients. The guidelines are now available for reference in the Journal of Association of Physicians of India (JAPI), providing a valuable resource for clinicians striving to deliver the highest standard of care.