Aurora Blog
Common Causes For Malicious Data Breach
Malicious data breaches – and what you need to know about them Introduction A data breach is a security violation, in which an organization, institution
The Rise of Automotive Hacking
In March 2022, concurrent with Tesla offering free charging of Electrical Vehicles in Ukraine, to help spur residents flee the war-ravaged country, came the announcement
The Cloud Is Also Vulnerable
A good definition of ‘Vulnerability’ where the cloud is concerned comes from Cloud Security Alliance (1). It defines vulnerability as a weakness in the system
Ransomware – Next Level Malware
You could say it was a trend simply waiting to happen. With the proliferation of networking, digital devices, online activity, Covid et al, the stage
Remote Working and the Evolving Cybersecurity Landscape
As cases of Covid 19 spiral downwards, organizations the world over are slowly getting back to ‘on-site’ working – the ‘old’ normal. In real terms,
Internet of Things (IoT) – Technology Without Borders
When the ARPANET [1], generally regarded as the forerunner of the internet with its WAN ideology and the precursor of the Internet of Things (IoT)
Online Fraud Detection – A Holistic Approach
Juniper, in its Online Payment Fraud 2020 2025 Summary, estimated that the global eCommerce fraud volumes were in the vicinity of $20 billion, with North
Multi Factor Authentication and Continuous Behavioral Authentication
The process of onboarding a suitable candidate to an organization, perhaps offers the best analogy to understand the meaning of Authentication Factors. To ensure the
Securities and Exchange Commission to introduce new Cybersecurity Disclosure rules
The Securities and Exchange Commission (SEC) is set to put in place a new set of directives that will make organizations more responsible for their
MDR – Delivering Results via Technology and Teams
In the 1983 film War Games, amongst the earliest movies on cybersecurity, officials rush in the hackers of a supercomputer, designed to work without human
Identity Access Management – The Need of the Hour
In one of the most famous cases of identity theft and wrongful access of confidential data, David M Read of Virginia stole the American Express
Edge Computing Security in an Expanding Cybersecurity Landscape
For want of a better description for Edge Computing Security in layman’s terms, and though comparisons can sometimes be out of place – think of
WHAT IS XDR – WHY IS IT IMPORTANT?
To understand what XDR (Extended Detection and Response) stands for in layman’s terms, one could perhaps use the analogy of defence systems trying to repel
PASSWORD FATIGUE – WHAT’S NEXT?
Imagine Alibaba and his band of forty thieves at the portals to the legendary treasure cave. ‘Open Sesame!’ he says, expecting the door to permit
EDR Security: Why is it Important?
As technology advances, more and more businesses are moving their operations online. This shift to the digital world has made it easier for companies to
Why Does Your Organization Need a Trusted Cybersecurity Partner?
Cybercrime continues to proliferate, and has globally caused a financial loss of $6 trillion1 in 2021, with an expectation to hit $10.5 trillion by 2025.