Contact us today.Phone: +1 888 282 0696Email: sales@aurorait.com

Unveiling the Role of Digital Forensics in Cybersecurity

Digital forensic experts often cite the case of Dennis Rader, the infamous killer, who came undone thanks to a forensic investigation. Often referred to as BKT, because of his preferred modus operandi of binding, torturing, and killing his victims, he committed a series of calculated and heinous murders in the seventies and eighties, leaving cryptic […]

The Growing Threat of Mobile Malware

Though it was relatively harmless in terms of the devastation that its modern cousins can wreak, the Cabir worm is regarded as the forerunner of malware in mobile devices. Given its name by Kapersky, the worm spread on mobile devices running the Symbian OS systems via Bluetooth. The worm caused the battery of the phone […]

The Danger of Encrypting Viruses in Modern Cybersecurity

Introduction In the Deep Space Nine episode of the hit sci-fi series Star Trek, a virus known as Cascade completely wipes out computer data on the USS Defiant, necessitating that it be brought back to base by another spaceship. The infection was not a part of the imagination of a screenwriter. Cascade was in fact […]

How Failure of Cybersecurity Tools Are Impacting Business Operations

Introduction In the late forties when American aerospace engineer Edward Murphy suffered the mortification of witnessing a mishap in his rocket sled tests, he unwittingly popularized one of the best known of the Murphy Laws – If something can go wrong, it will. Though the ‘law’ was more in the manner of a humorous statement, […]

Defending Against Watering Hole Attacks in Today’s Cyber Landscape

Introduction The Chernobyl disaster in 1986, one of the most catastrophic nuclear accidents in history, remains a powerful reminder of the devastating consequences of a targeted failure. The explosion and subsequent radiation release at the reactor were the result of a deadly combination of design flaws and human error, strategically exploited during a routine safety […]

Soft Skills Transforming Cybersecurity Professionals

Introduction From the way ‘soft skills’ has taken center stage in many professions, you’d think it is a concept that is only around a decade or so. Not so. The history of soft skills goes back to the late sixties/early seventies and is credited to the American armed forces (1). The then army strategists found […]

The Importance of Managing Non-Human Identities in Modern Cybersecurity

Introduction Half a century ago, no one would have imagined how times would change in the world of computers. Once believed that computers were the domain of human beings – their prerogative to access, operate and manage – it is remarkable how today’s scenario is such a far cry from those early days. Take the […]

How Compliance Automation Can Revolutionize Organizational Efficiency

Introduction Amongst the most talked-about requirements of an organization, is the need to be compliant. Every mature industry now calls for organizations within its folds to follow regulations that ensure it is compliant with industry standards, best practices, and certified processes. Compliance teams are akin to watchdogs – constantly on the lookout for grey areas […]

Understanding Chatbots: Opportunities and Challenges

A decade ago, no one would have dreamed that commercial and other organizations would use a virtual assistant to answer queries which until then were the sole responsibility of a salesperson, an office telephone operator, or a receptionist. While organizations still deploy the latter in their front offices, taking cognizance that human interfaces are still […]

Open Source Software in a Cyber-Conscious World

Open Source Software in a Cyber-conscious World The March 2017 breach  (1) of credit giant Equifax that resulted in the loss of an estimated 143 million personal records is widely cited in Open Source Software (OSS) circles as one reason for vulnerability vigilance. The breach occurred when attackers used a consumer complaint web portal to […]