Aurora Blog
Zero Trust Security for Small and Medium-Sized Businesses: What You Need to Know
In today’s digital age, small and medium-sized businesses (SMBs) are increasingly vulnerable to cyber threats. According to a study conducted by the Ponemon Institute, 76%
Social Engineering at Work
In early 2020, when a manager in a bank in Hong Kong received a phone call from a director of a company he knew (1),
AI – The Twin-Edged Sword Shaping the Future of Cybersecurity
Almost all new inventions that promise to revolutionize a field or remedy a despairing situation are fraught with dangers that bear examination. Take the case
Calls for Greater Data Privacy and Cybersecurity Regulation Gain Momentum
As the Russian-Ukraine conflict enters its second year, the cybersecurity industry will recall the signing of the March 22, 2022, cyber incident reporting law by
Why Cyber Insurance is Changing the Cybersecurity Landscape
Introduction The growing trend of remote work across various industries, coupled with advancements in technology such as IoT, 5G, and metaverse, has elevated the significance
Challenges for Cybersecurity in a World of Quantum Computers
In the 2013 documentary Taming the Quantum World (1), physicists in the Canary Islands are working on a project to build a quantum computer by
The In and Out of Insider Threats
The In and Out of Insider Threats ‘Trust no one, verify everyone’ is a mantra commonly referred to when speaking about Zero Trust Architecture (1).
The Endless Need for Employee Education and Awareness in Cybersecurity
When employees of tech giants Google and Facebook, arguably amongst the most inviolable when it comes to scamming and certainly amongst the most updated when
Attacks on Critical Infrastructure – An Uphill Battle
In May 2021 when the gasoline supplies to the East Coast of the US went down as a consequence of the Colonial Pipeline ransomware attack,
State-Sponsored Cyber Terrorism: A Harbinger of Things to Come
Introduction In the beginning, there was Stuxnet. The year was 2010, and the world had not yet encountered a cyberweapon. Stuxnet, a computer worm unleashed
Dark Data: What It Is and Why It Need Not Be So Dark After All
There is an ominous ring to the word ‘dark’. The words dark web, dark matter, and dark night, to name just a few, evoke feelings
The Role of Automation in Cybersecurity
In the not-so-distant past, it was the done thing for Security Operating Centers (SOC) to manually address data breaches. Cyberattacks today however are so frequent,
Mobile Is the New Target
It’s safe to say that the future of computers and communication lies not in the conventional desktop, but with mobile devices like smartphones, tablets, and
5G and IOT – Symbiotically Changing the World
Introduction When Graham Bell invented the first working telephone in 1876, almost a century and a half ago, never would he have imagined even in
Cyberterrorism – A Devastating Reality
One of the crudest but also true-to-life jokes about the advent of online goes like this: “Terrorist organizations have decided to get into online crime
Breach Fatigue Tips for Protecting Your Organization in a Constant Cyber Threat Landscape
Introduction The Aesop fable of the boy who repeatedly raised false alarms about a big bad wolf teaches us that people may become inured to