Aurora Blog
Managed Service Providers – And Just Why Organizations Need Them On Board
Introduction In the rapidly evolving business world, Managed Service Providers (MSPs), until recently, have been the last word when it came to providing comprehensive, single-point
The Importance of Threat Modeling for Organizations
Introduction It’s a war out there and the top brass have assembled. Enemy forces are posing a crisis and the generals must strategize their next
Redefining Cybersecurity Insurance for the Evolving Digital Threat Landscape
The 2017 Russian-backed NotPetya attack (1) that affected numerous verticals in over 65 countries worldwide, crippling computers with a worm that prevented systems booting, is
A Concerted Plan for AI Risk Mitigation
In 2017 with Christmas round the corner, when fans of OWN, Oprah Winfrey’s Television Network received an Instagram message from her asking them not to
The Evolving Role of CISOs and the Communication Challenges in Cybersecurity Leadership
Introduction In the 80s hit song Here Comes the Rain Again, Annie Lennox, one part of the then famous pop group Eurythmics, sings despairingly with
SIEM: Your Go-To Cybersecurity Solution of Choice
Introduction The digital world has made many things relatively easy to accomplish. The wide variety of apps and huge repositories of information available at one’s
The Looming Threat of Fatigue, Stress and Burnout in Cybersecurity
The March 2022 attack on communications app maker 3CX was not the first attempt by threat actors to monetize their scams. Perpetrated by the Labyrinth
Managing the Risks of Generative AI and LLMs Through Technological Advances
The RSA Conference in San Francisco in April 2023 brought into sharp focus the increasing role of Artificial Intelligence (AI) in shaping the digital landscape,
Identity Fabric Immunity – IAM Redefined
Introduction At the March 2023 Gartner Identity & Access Management Summit, which brought together the Who’s Who of the cyber security world to debate the
Shadow AI – The New Insider Threat
The advent of Zero Trust spawned the mantra ‘Trust no one, verify everyone.’ After a spate of serious data breaches involving their employees, organizations began
Digital Supply Chains: Under Siege in the Cyber Realm
Introduction Though the evolution of cyber threats (1) dates back to 2013 when Iranian hackers breached the Bowman Avenue Dam in New York and seized
The Advantages of Vendor Consolidation and Product Convergence in Cybersecurity
Introduction As with the case of every other entity, the suite of applications, platforms, and software procured over a period by an organization, can become
Cyberbullying: The Real and Present Danger
Introduction From time immemorial, human beings have tried, with varying degrees of success, to impose themselves on others, with a view to profit from the
Enhancing Productivity and Security: The Case for a Clean Desk Policy in Organizations
In a corporate world seemingly already overwhelmed with a variety of policies – HR, Safety, Infotech, HSE, to name just a few – it may
Exploring the Synergy: Big Data, AI, and the Human Interface
Think about the future and the John Lennon hit Imagine comes readily to mind. Though the iconic singer-songwriter alluded to a non-material world in the
The Dark Side of Technology: Deepfakes and their Threat to Cyber Security
Introduction In 2019, when the head of a UK energy firm (1) received an urgent call from the CEO of the company’s German headquarters, advising