Aurora Blog
Why use a Managed Service Provider for your existing Encryption deployment?
By Ralph Figueiredo What would be the essential components of a managed service for encryption if you were looking to pick one? We’ve been
Why do companies choose Hosted Disk Encryption SaaS?
By Ralph Figueiredo There are several reasons/benefits to hosting or deploying laptop encryption as a SaaS. Primarily, encryption is not an internal core competency
Aurora Becomes Symantec Master Specialist
LOS ANGELES, Calif., June 25, 2012 – Aurora, a leading IT company specializing in state-of-the-art security and compliance solutions for business critical applications, has been
High-Tech Fashion and IT security…
Computer clothes. Sounds a little silly, but that’s where we’re headed. Once the laptop allowed us to take our Word docs and photo albums and
Caution vs. Convenience: The Lure of OneID
For many of us, it started innocently enough. The first time we went online, whether it was the early days of AOL or our first
Symantec on 60 Minutes
If you’re of a certain age and you hear about a company being featured on 60 Minutes, it conjures up memories of Mike Wallace chasing
The Next Generation of Computers?
Twenty years ago, we had no idea of the ways in which a computer and the Internet would impact our lives. So it stands to
If You’re Going to Be Spied On, Might As Well Get Paid For It
Google’s been in the tech headlines lately, and not in a way that will bolster their stock prices. Words like “invasive” and “Big Brother” have
Aurora Becomes Authorized Symantec Software Licensing Program Reseller
DATE: January 19, 2012Los Angeles, California (PRWEB) January 19, 2012Aurora, a leading IT company specializing in state-of-the-art security and compliance solutions for business critical applications,
The Maturation of Mobile Medical Apps
Technology doesn’t seem to be worth as much these days unless you can take it with you. Laptops, smartphones and tablets have fueled the evolution
Beware of Supermarket Sniffers
California shoppers at the Lucky supermarket chain felt anything but lucky after discovering that their credit card information may have been hacked. Until now, the
The Need for Speed
Hard to believe, but the film Top Gun is now 25 years old. Among other things, this is the movie that gave us the famous
Just Another Day
Companies and municipal organizations that braced themselves on September 24, concerned about cyber-attacks launched by the hacker group Anonymous, are breathing easier now. As it
Twitter Hits a Milestone
How many people thought Twitter was a dumb idea when they first heard of it? Who could have guessed that this 140-character social network would
Paging Dr. Chrono
Data breaches in the healthcare field are a significant concern that Aurora has tried to not only highlight, but to provide solutions to prevent. We
Filling the Holes
Computerworld magazine published an insightful piece on six enterprise security leaks that should be addressed. Read the piece here: (https://www.computerworld.com/s/article/9189738/Six_enterprise_security_leaks_you_should_plug_now?taxonomyId=17pageNumber=1) The list begins with unauthorized