Aurora Blog
Detect Compromised Sessions in Real Time
Most traditional authentication happens once, maybe twice per day. It’s when you first get started in the morning, you sit down, you type in a
Who’s on First? Keeping Track of the Mergers & Acquisitions of 2021 So Far
We are six months into 2021 and there has been a lot of movement in the cybersecurity industry as far as mergers and acquisitions go.
How The Recent White House Executive Oder Impacts Your Organization’s Cybersecurity
On May 12, 2021, The US President issued an “Executive Order on Improving the Nation’s Cybersecurity.” This announcement came soon after the Colonial Pipeline Cybersecurity
What is Behavioral Biometrics?
Security practices of the past and present are becoming increasingly ineffective in protecting data as attackers are getting more sophisticated. New technologies are now required
If You’re Reading This, Change Your Password
Is your password still your dog’s name followed by an exclamation point? If so, it’s time to change your password. Far too many people, including
Aurora Systems Consulting, Inc. Joins the Plurilock Security Inc. Family
Acquisition will not significantly alter Aurora’s leadership, sales, or engineering teams but is expected to expand and enhance Aurora product offering, margins. April 1, 2021
Navigating IAM in the Cloud
75% of all cloud security breaches are a result of poor permission management according to Gartner. As your organization continues to work in the cloud,
Addressing Shadow IT
How many third-party Software as a Service (SaaS) applications do you use during the workday? Does your IT department know about all of them? This
Aurora Addresses Vulnerability Management in a Post-Pandemic World
Aurora Security Consulting Services released a report on the challenges that may be causing businesses’ vulnerability management programs to fail in an increasingly cloud-based world.
Meet Multiple Security Frameworks on One Platform
As your organization matures, you may need to meet additional security requirements. For example, many organizations that were previously required to comply with the NIST
3 Key Aspects of Cloud Conformity
Platforms such as AWS and Azure provide a secure cloud infrastructure that is increasingly being adopted by leading organizations. When you adopt these platforms, you
Application Security: What You Need to Know
For Application Security to be effective, it must work fast. Trend Micro’s Cloud One Application Security automatically detects attacks and gives you the visibility to
Cyber Threats to Look Out for This Valentine’s Day
You’ve heard that there are plenty of fish in the sea–but did you know about all the phishing that takes place every year in honor
SolarWinds Impact for Security Managers
The cybersecurity community continues to investigate recent attacks that are linked to SolarWinds. The popular network monitoring software, SolarWinds Orion, was compromised by a massive,
How to Celebrate Data Privacy Day
For Businesses and individuals alike, the data that we store online continues to grow. On Data Privacy Day, we are raising awareness of actionable steps
Keep Up with the Vulnerability Management Cycle
Are you securing the low hanging security risk in your environment? Vulnerability assessments can help identify the weaknesses in your security infrastructure so that you