The Rise of Automotive Hacking

In March 2022, concurrent with Tesla offering free charging of Electrical Vehicles in Ukraine, to help spur residents flee the war-ravaged country, came the announcement of EV stations in Moscow being hacked and disabled. A few years earlier in 2020, engineers stage-managed testing of cyber hacking of EV stations. (1). While it was not disclosed…

read more

The Cloud Is Also Vulnerable

A good definition of ‘Vulnerability’ where the cloud is concerned comes from Cloud Security Alliance (1). It defines vulnerability as a weakness in the system and not a software bug. For this reason, it can lie dormant till discovered and either remedied or exploited. It is essentially therefore a state waiting to be triggered by…

read more

Ransomware – Next Level Malware

You could say it was a trend simply waiting to happen. With the proliferation of networking, digital devices, online activity, Covid et al, the stage couldn’t have been more perfectly set for ransoms to evolve from hostages in the real world to data in the digital world. From an evolutionary point of view, also this…

read more

Remote Working and the Evolving Cybersecurity Landscape

As cases of Covid 19 spiral downwards, organizations the world over are slowly getting back to ‘on-site’ working – the ‘old’ normal. In real terms, many have loosely evolved to a hybrid style of working, with employees working part-time in the office and part-time from home. Loosely because these decisions, as in the peak Covid…

read more

Internet of Things (IoT) – Technology Without Borders

When the ARPANET [1], generally regarded as the forerunner of the internet with its WAN ideology and the precursor of the Internet of Things  (IoT) was invented in the mid-sixties, no one would have imagined the potential it carried or the exponential growth it would spur, let alone the innumerable offshoots that it would produce.…

read more

Online Fraud Detection – A Holistic Approach

Juniper, in its Online Payment Fraud 2020 2025 Summary, estimated that the global eCommerce fraud volumes were in the vicinity of $20 billion, with North America accounting for almost 45 to 50% of that [1]. And the UK-based digital research agency goes on to predict in a press note that the annual losses in the…

read more

Multi Factor Authentication and Continuous Behavioral Authentication

The process of onboarding a suitable candidate to an organization, perhaps offers the best analogy to understand the meaning of Authentication Factors. To ensure the ‘right’ person for the position, organizations carry out a variety of tests to ascertain the background, bona fides, technical knowledge and acumen, cognitive ability, personality, and health of the candidate.…

read more

Securities and Exchange Commission to introduce new Cybersecurity Disclosure rules

The Securities and Exchange Commission (SEC) is set to put in place a new set of directives that will make organizations more responsible for their cybersecurity measures and activities. The move is intended to shore up the confidence levels of their investors, by providing greater levels of transparency about the cybersecurity fabric of the organization.…

read more

MDR – Delivering Results via Technology and Teams

In the 1983 film War Games, amongst the earliest movies on cybersecurity, officials rush in the hackers of a supercomputer, designed to work without human interface. At stake is a world war that stands to be triggered by the supercomputer. Cut to 4 decades later. Security Operations Centers (SOCs) are reeling under the dual pressures…

read more

Identity Access Management – The Need of the Hour

In one of the most famous cases of identity theft and wrongful access of confidential data, David M Read of Virginia stole the American Express Card of actress Demi Moore in 2018. He then obtained her Social Security Number (SSN) and other personal information online and used the card to binge shop to the extent…

read more
Aurora has joined the Plurilock FamilyLearn More