Aurora Blog
Navigating the Complex World of Bots in Modern Cybersecurity
Introduction In 1995, when English Premier League top team Arsenal decided to buy mercurial Dutch forward Denis Bergkamp, they knew they were taking on a
Evaluating Cybersecurity Systems Through Rigorous Testing
Introduction The ‘proof of the pudding is in the eating’ is an old English phrase. Commonly understood to mean that it is possible to make
Securing Our Schools – Combatting the Surge in Cyberattacks on K12 Education
Introduction Though child abuse is an odious comparison, it can be argued that the increasing cyberattacks on K12 schools, students, and their hapless families are
Data Poisoning and Exactly Why Organizations Need to Take It Seriously
The Netflix docuseries Alexander – The Making of a God, compels lovers of history to revisit some of the better-known facts of the Greek wannabe
Negotiating the Challenge of Cloud-Native Worms
In the hit-sixties sci-fi movie The Andromeda Strain, a microbe forcibly enters a spaceship en route to Earth, and proceeds to infect the hapless population
People Management In Cybersecurity
Adopting a people-centric approach to cybersecurity In October 2023, the CISA-led Cybersecurity Awareness Month celebrated its 20th anniversary. The annual event which premiered in 2004,
The Rise of Mitigation Services in Cybersecurity Management
Introduction Any good project manager will tell you the importance of having a Plan B in store, in the event that a risk materializes unexpectedly.
Quelling the Menace of Cryptographic Attacks
To say that the Romans most of the time, were ahead of the times, is not entirely out of place. At least where military matters
Combating the Insidious Nature of Polymorphic Malware in Cybersecurity
Fans of superhero movies know Mystique from X-Men for her ability to shapeshift and mimic voices with precision, making her a formidable foe. This ability
Passwordless: The New Mantra
Introduction The September 2023 hacking of MGM Resorts International by Scattered Spider, a relatively nascent hacking group operating out of the United States and UK,
Email Scams Reimagined: The Rise of AI-Driven Cyber Deceptions
There is almost nobody who has been on the internet, who has not encountered it. From the early 1980s, the Nigerian Prince email scam (10),
Cybersecurity Talent Crisis Amid Shortages, Burnout, and CISO Resignations
Perhaps no other industry can lay claim to such a spate of challenges in a short span as the cybersecurity industry. Still very much in
Navigating the Quantum Revolution: A New Era of Cybersecurity
Imagine a scene from the critically acclaimed film “The Imitation Game” – a race against time, set against the backdrop of World War II. Alan
The Cybersecurity Renaissance: AI and Machine Learning in Threat Detection and Response
Introduction: In the annals of history, the Renaissance period stands out as a time of profound transformation and enlightenment, a period when humanity made giant
Mastering Compliance in Cloud Computing: Strategies for the Modern Business
In today’s digital era, where cloud computing has become the backbone of many businesses, navigating the labyrinth of compliance and data protection regulations has emerged
New Cybersecurity Legislations: Guiding Organizational Action and Beyond
It is a war out there alright, and strong words are in order. Released in August 2023, the Cybersecurity and Infrastructure Security Agency’s (CISA) 2024-2026