AUJAS CYBERSECURITY BLOG

Views, insights, and perspectives on cybersecurity trends

Defending your data: The value of CREST accreditation in penetration testing

Beyond the breach: An insider's guide to red teaming assessments

Rapid reset attacks: A call to action for HTTP/2 users

The ROI of Complying with Guidelines for Account Aggregator Ecosystem

Combatting alert fatigue in organizations with automation and SOAR

7 reasons to include penetration testing for your applications

Protecting your organization from MOVEit vulnerabilities

How to do Zero Trust Security the Right Way

The What, Why, and How of OT Security

Powering incident response with automated playbooks in SOAR

How Aujas Cyber Defense Center powers IBM QRadar to enable 24x7 threat protection

Customer Identity and Access Management to Build Better Customer Experiences and Trust

How Identity Governance can mitigate insider threats, reduce costs through automation & enable compliance

How to Strengthen Your Security Operations with Azure Sentinel, Azure Defender & Azure Security Center

Few Facts About the Personal Data Protection Bill & Technical Due Diligence Needed for Compliance

How IBM QRADAR can transform security operations to take on increasing cyber risks

Security practices to mitigate risks & ensure resilience in Kubernetes

Software Composition Analysis to discover vulnerabilities in open-source code

Identifying security vulnerabilities in software development lifecycles using DevSecOps

Why machine learning is critical for threat detection and response in security operations centers

The ROI of Complying with Guidelines for Account Aggregator Ecosystem

OT security to secure digital transformation in the manufacturing sector

Overcoming the Inadequacies of Security Operations Center with Cyber Defense Center

Automated Penetration Testing using Deep Exploit

Powering incident response with digital forensics

Cloud Security and Compliance Strategies to Enable Digital Transformation

Microsoft Cloud App Security to secure user access of Cloud services

How extended SOAR platforms can transform threat intelligence

Ensure Endpoint Security with Microsoft Defender ATP

Quickly improve the effectiveness of security operations with XDR

Aujas Cyber Defense Center - Virtual Launch Recap, March 25th, 2021

Maximize security capabilities. Evolve security posture. Adopt the Cyber Defense Center from Aujas.

Microsoft Azure Sentinel - The Cloud Native SIEM & SOAR Solution

XDR Capabilities to Future Proof Security Operations

Circumventing Automated Cyber attacks with SOAR

Threat Hunting to Mitigate Complex Cyber Attacks

Importance of Mobile Application Penetration Testing

Enhancing cyber preparedness by leveraging threat intelligence

Look no further. Get SOAR to mitigate security risks.

Combined power of SOAR - SIEM to boost cyber defenses

Rise of cloud-native SIEM & SOAR platforms for effective threat management

Managed Detection and Response. An Ideal way to take on any threat.

The importance of penetration testing and how it can fix security vulnerabilities

Cloud security posture management to minimize breach risks

Safeguard Cloud. Address Cloud Security Concerns.

Integrating security into DevOps through DevSecOps

Importance of penetration testing to maximize cloud security

Engineering security transformation through Cyber Defense Center

Artificial Intelligence - The magic potion to bolster cybersecurity

Transform your security posture. Take on complex threats. Get the MDR service advantage.

Challenging an organization’s cloud security posture with rigorous Red Team assessments

Antivirus isn’t enough, You need endpoint detection and response solutions to protect devices across networks

Addressing Unique IAM Challenges in Higher Education

How Blockchain can minimize IoT security challenges

How to Mitigate Insider Threats with SIEM & UEBA

Overcoming SIEM Challenges to Thwart Today's Security Threats

Fundamentals of securing the code sign process

How to Detect and Prevent Data Loss Due to Remote Work

Consolidating Cybersecurity Practices to Enable & Drive Remote Employee Productivity

The Mitre ATT&CK approach for effective Red Team simulations

IAM advice for organizations entering the post COVID world

SSO authentication - What it is and How does it work

Enabling Application Security through Effective Program Management

DDoS Simulations - A proactive exercise to prevent DDoS threats

Managed Detection and Response (MDR) - The proven way to mitigate sophisticated threats

Essential Guidelines to Secure Remote Access When Working from Home

Cybersecurity and Personal Hygiene Tips While Working from Home or a Remote Location

How Red Teaming Can Help You Reduce Cyber Attacks

Modernizing IAM - The strategic need to harness robotics

Ensure a higher level of security preparedness. Move from MSSP to MDR services.

Expert Tips for Managing a Cybersecurity Consulting Engagement

Securing applications and establishing publisher identities with automated code signing

Cybersecurity in the Kingdom of Saudi Arabia

10 Reasons Your Organization Needs Red Team Testing

Five-point mantra for a successful cybersecurity career

How to Effectively Automate and Implement GRC Solutions

Enabling your own Security Operations Center (SOC) maturity model – A DIY Guide

Fixing Security Loopholes and Securing Private Blockchains from Vulnerabilities

Risk Management and the Heisenberg’s Uncertainty Principle

Solving data challenges using vulnerability intelligence

NYDFS Cyber Security Regulations - Made Easy (Part 1)

NYDFS Cyber Security Regulations - Made Easy (Part 2)

Is Internet of Things becoming Internet of INSECURE Things?

Our Top 10 Cyber Security Predictions for 2017

NYDFS Cyber Security Regulations - Made Easy (Part 3 Final)

Sample RFP Questions on SOC Build/Optimization Services

Aujas Achieves Cert-In (India Computer Emergency Response Team) Empanelment For 2016-19

6 IoT Security Worries that could ruin your Internet-of-Things Party

10 Basic Things Every Organization MUST-DO for Cybersecurity

Managing Information Risk For Digital Age: Why It's Not About Security

Pokemon GO - Security lessons you just cannot afford to miss !

Why Security Analytics, What are Your Choices, and When?

Will a Bug Bounty Program Make Your Enterprise Secure?

Ten questions for CISOs to check whether their vulnerability management program is working

10 Ways CIOs & CISOs Can Beat Talent Crunch in Information Security

How to Make SIEM to Mitigate Advanced Threats ?

4 Immediate Changes to make Traditional Vulnerability Management to Work

Time to Re-think Vulnerability Management ? These 5 Facts Say So...

Know different Phishing tactics. Don’t get lured by them.

How can Internet of Things (IoT) Not become a pain-in-the-a$$ from a cyber security perspective?

30-Sec Guide: How to save from DROWNing?

Encounter with Mobile Malware

Mobile Phishing: Thief right in your pockets

Venom Vulnerablity

Logjam (CVE-2015-4000) – Are you FREAKed again?

Fundamentals of Secure Code Review - Part 1

Key learning from Security Breaches of 2014

How to design a Cryptographic Solution – Part 2

A Glimpse into Mobile Security

How to design a Cryptographic Solution - Part 1

FREAK Vulnerability (CVE-2015-0204)

Understanding and Testing Web Services- Part 1

Shadow-Utils to protect and store passwords in Linux

Aujas Security Analytics Platform wins laurels at DSCI Security Summit

The Escalating Trend in cyber-security

Understanding and Fixing the POODLE SSL Vulnerability (CVE­2014­3566)

SHELLSHOCK - [CVE-2014-6271]

Five Things You Ought to Know to Prevent a Vishing Attack

Aujas to Unveil Two New Information Security Services at IBM Pulse 2014

Aujas Raises Series B Funding

Aujas is now an Amazon Consulting Partner

BYOD and A

Emerging Trends in IT Security in 2014

Top Information Security Stories of 2013

Cloud Application Security consideration and Mitigation

Data Loss Prevention – A Technology or System?

Sisyphus meets Athena

India’s National Cyber-security Policy – A Perspective and Analysis

ISMS in a brave new world

Penetration Testing of Java Applets

How to hack through Phone Ring Test

How to integrate vulnerability risk into larger business risk using GRC tool

Data Centric World: Zen and the Art of Data Protection

No More Data Leaks- Tip 3: Telling is not enough, you have to show

No More Data Leaks - Tip 2: Does Data Classification Help

Data Centric World: A Common Sense Guide to Data Management

No More Data Leaks - Tip 1: Do a Data Leakage Assessment

Data Centric World: A Brief History of Data Protection

A Quick Test to find out if your Company is really serious about Security

Getting Your Data Leakage Protection Right

A Quick Overview of SAP NetWeaver Identity Management Solution

The Need for SAP Identity Management

Should Organizations be concerned about Open Source Software Compliance?

Identity and Access Management: Before and After Scenario

Securing B2C Mobile Applications

Identity and Access Management: Before and After Scenario

The Smooth Sailing Fallacy - CEO's Watch-Out - Your ERP may be Insecure!

High Performance SAP Security – Guard Your Business, Not Just Your SAP ERP

Aujas signs with Palamida to offer Intellectual Property and Security compliance services

Aujas wins NASSCOM EMERGE 50 2011 award and also Deloitte Technology Fast 50 India 2011 award

Managing Risk of Privileged Access and Activity Management

Consumerization is Real

Outlook for Mobile payment adoption in India is Bright, but Security is still a big concern

Aujas Opens New Office in California to Focus on Global Growth

Secure Software Development by Design

Mitigating Security Risks in USSD based Mobile Payment Applications

Windows Azure: Build Secure Applications by Design

Amazon EC2 Failures Are a Wakeup Call for Cloud Customers

Phishers Target Social Media, Are You the Victim?

Amazon EC2 Failures Are a Wakeup Call for Cloud Customers

Phishers Target Social Media, Are you the Victim?

The Business Case for Secure Development Lifecycle

Data-Breach Risk Is Not Only from Insider Threats

Data Protection and Controls – Does Format Really Matter?

Data Governance – What We Need to Think About

Cloud Computing – Security Threats and More...

Right to Internet Use

Right to Internet Use

Security Breaches Continue to Grow

Effective Data Protection Requires More than Technology

What Is Needed for Data Protection?

5 Hot Topics in Information Security for 2011

Service Oriented Architecture (SOA) Security in the Cloud

Secure Code Development Is in Your Future

Ephemeral Borders: Privacy and Security of Data in the Cloud

Operating in the Cloud – Sunny with a Chance of RISK!

Consumerization of the Enterprise

More than Password Resets – Identity and Access Management’s Real Value

Wikileaks Fallout: DLP Helps But Doesn't Solve, Analysts Say

Single Sign-On – Choosing Practical over Paranoid Security

HIMSS Survey of Security Pros Is Food for Thought

PCI DSS Version 2.0 – Ready?

New Trends in Phishing Attacks

Mobile Security with J2ME

Information Risk Management and M+As Part 2

Vulnerability Management – Have You Thought about It Lately?

Ephemeral Borders: Privacy and Security of Data in the Cloud

Information Risk Management Concerns in Merger & Acquisition

Physical Security Controls – Where Are We Lacking?

Converged Identity and Access Management - Final

How I Hacked My Car Manufacturer

Number of Breaches Going Up and Up!

Understanding the Need for Converged Access Control

Stuxnet Accelerates Exponential Decay!

The Need for Converging Identities

Cyber Crime: The Ominous Writing on the Wall

Converged Identity and Access Management to unify and effectively manage user access

Secure File Uploads - Risky?

Curbing Access Risk: Role Based Access Governance

The Curse of Compliance