Aurora Blog
Making Cybersecurity a Priority
Cybersecurity should be your first consideration when conducting business and navigating the web. As your business constantly adopts new technologies and policies to adapt to
It’s Clean Your Virtual Desktop Day: Why You Should Celebrate
Every year on the third Monday in October, “Clean Your Virtual Desktop Day” is celebrated. Just like how our physical desktops need to be cleaned
Red, Blue, and Purple Teaming – What’s the Difference
Many mature and sophisticated infosec teams are moving their focus from traditional penetration testing engagements to Red Teaming exercises. As you consider this move, what
Where Do National Cybersecurity Improvements Begin?
Even organizations with cybersecurity measures in place are being affected by cyberattacks. Critical infrastructure, healthcare, and state & local government agencies have been frequent targets
23 Years Later: Improving the Security of Google Products
If you’re tuning in on September 7th, it’s Google’s Birthday! In honor of Google Commemoration Day, we did some googling ourselves to understand the history
What Biden’s Memo on Critical Infrastructure Means for You
Two months after releasing an Executive Order on Improving the Nation’s Cybersecurity, Biden has released a Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems.
Level Up Your Endpoint Security
Most security-conscious companies will have an endpoint security solution in their environment to better protect the devices used at their organization. Having tools such as
How State & Local Government Organizations Are Receiving Cybersecurity Funding
As a part of the American Rescue Plan Act (ARPA), the Coronavirus State and Local Fiscal Recovery Funds may make your state and local government
Security Risks of Returning to the Office
After working from home since March, organizations are eagerly inviting their workers back to the office on a full-time or hybrid basis. Managers see the
The Most Essential Component of Your Security Portfolio
The victims of cybersecurity attacks continue to make headlines, daily. As we increasingly utilize internet connected devices and hackers continue to grow more sophisticated, cybercrime
Digital Transformation: It’s More Than Just the Cloud
We are living through a digital transformation in all areas of business—not just the cloud. Cloud computing and infrastructure as code are being used at
Sunglasses and Cybersecurity: An Unlikely Combination
Vacation season is upon us! Traveling is becoming safer, and cities are reopening—just remember to pack sunglasses to shield you from the sun and cybersecurity
Ransomware: To Pay or Not to Pay
Ransomware has become one of the fastest-growing forms of cybercrime. While the best option is to not become a victim of a ransomware attack, no
Avoid Security Alert Fatigue with DEFEND
Are your analysts drowning in alerts? DEFEND may be your solution. Many security experts get security alerts from multiple sources throughout the day; many of
Do You Have All the Components within the SASE Framework?
Security-conscious IT managers are increasingly adopting the Secure Access Service Edge (SASE) framework within their existing cybersecurity policy. The Secure Access Service framework helps to
It’s A Great Time to Be a Hacker
In the past few months, high profile cyberattacks have been affecting oil, government agencies, and the meat industry, to name a few. Hackers are getting