AUJAS CYBERSECURITY BLOG

Views, insights, and perspectives on cybersecurity trends

Navigating Regulatory Challenges in Third-Party Risk Management: What You Need to Know

PALM – Smart Onboard and Integration

How Vendor-Related Breaches Are Shaping Cybersecurity Strategies in 2025

Transforming Identity and Access Management with Intelligent IAM Solutions

From Convolution to Evolution: The Emergence of AI in Modernizing IAM

Debunking IAM Myths: What You Should Know

From Legacy to Cloud-Native SIEM: What You Need to Know for a Seamless Migration

Enhancing API Security with AI/ML: A Critical Imperative

The ROI of Intelligent Access Management

The Future of API Security – Trends and Best Practices

Six Essential Reasons Every Business Needs an Integrated Security Assurance Program (iSAP)

Zero Trust Cybersecurity for Financial Services: A Strategic Perspective

Spiderman, Artificial Intelligence, and IAM

Shaping the Future of Cyber Defense with Zero Trust Cybersecurity

Brand protection and real-time Threat Monitoring: Enhancing cyber resilience

Enhancing threat detection, analysis, and response with Google SecOps

Five things to look for in your MDR solution

Machine identities: A key element of Zero-Trust strategies

Aujas partners with Thales for secure code sign solutions

Adapting Access Governance in the Age of Generative AI

Making Identity Solutions Simple for Hybrid Environments

Struggling with security bottlenecks in SDLC? It’s never too late to implement DevSecOps

Integrated security: The IAM and PAM synergy

More signal, less noise: Harnessing IAM KPIs

Maximize IAM efficiency with strategic KPIs

Using Generative AI (GenAI) for Enhanced Threat Detection and Response with MDR, XDR, and EDR

Defending your data: The value of CREST accreditation in penetration testing

Before the Breach: An Insider's Guide to Red Teaming Assessments

Rapid reset attacks: A call to action for HTTP/2 users

The ROI of Complying with Guidelines for Account Aggregator Ecosystem

Combatting alert fatigue in organizations with automation and SOAR

7 reasons to include penetration testing for your applications

Protecting your organization from MOVEit vulnerabilities

How to do Zero Trust Security the Right Way

The What, Why, and How of OT Security

Powering incident response with automated playbooks in SOAR

How Aujas Cyber Defense Center powers IBM QRadar to enable 24x7 threat protection

Customer Identity and Access Management to Build Better Customer Experiences and Trust

How Identity Governance can mitigate insider threats, reduce costs through automation & enable compliance

How to Strengthen Your Security Operations with Azure Sentinel, Azure Defender & Azure Security Center

Few Facts About the Personal Data Protection Bill & Technical Due Diligence Needed for Compliance

How IBM QRADAR can transform security operations to take on increasing cyber risks

Security practices to mitigate risks & ensure resilience in Kubernetes

Software Composition Analysis to discover vulnerabilities in open-source code

Identifying security vulnerabilities in software development lifecycles using DevSecOps

Why machine learning is critical for threat detection and response in security operations centers

The ROI of Complying with Guidelines for Account Aggregator Ecosystem

OT security to secure digital transformation in the manufacturing sector

Overcoming the Inadequacies of Security Operations Center with Cyber Defense Center

Automated Penetration Testing using Deep Exploit

Powering incident response with digital forensics

Cloud Security and Compliance Strategies to Enable Digital Transformation

Microsoft Cloud App Security to secure user access of Cloud services

How extended SOAR platforms can transform threat intelligence

Ensure Endpoint Security with Microsoft Defender ATP

Quickly improve the effectiveness of security operations with XDR

Aujas Cyber Defense Center - Virtual Launch Recap, March 25th, 2021

Maximize security capabilities. Evolve security posture. Adopt the Cyber Defense Center from Aujas.

Microsoft Azure Sentinel - The Cloud Native SIEM & SOAR Solution

XDR Capabilities to Future Proof Security Operations

Circumventing Automated Cyber attacks with SOAR

Threat Hunting to Mitigate Complex Cyber Attacks

Importance of Mobile Application Penetration Testing

Enhancing cyber preparedness by leveraging threat intelligence

Look no further. Get SOAR to mitigate security risks.

Combined power of SOAR - SIEM to boost cyber defenses

Rise of cloud-native SIEM & SOAR platforms for effective threat management

Managed Detection and Response. An Ideal way to take on any threat.

The importance of penetration testing and how it can fix security vulnerabilities

Cloud security posture management to minimize breach risks

Safeguard Cloud. Address Cloud Security Concerns.

Integrating security into DevOps through DevSecOps

Importance of penetration testing to maximize cloud security

Engineering security transformation through Cyber Defense Center

Artificial Intelligence - The magic potion to bolster cybersecurity

Transform your security posture. Take on complex threats. Get the MDR service advantage.

Challenging an organization’s cloud security posture with rigorous Red Team assessments

Antivirus isn’t enough, You need endpoint detection and response solutions to protect devices across networks

Addressing Unique IAM Challenges in Higher Education

How Blockchain can minimize IoT security challenges

How to Mitigate Insider Threats with SIEM & UEBA

Overcoming SIEM Challenges to Thwart Today's Security Threats

Fundamentals of securing the code sign process

How to Detect and Prevent Data Loss Due to Remote Work

Consolidating Cybersecurity Practices to Enable & Drive Remote Employee Productivity

The Mitre ATT&CK approach for effective Red Team simulations

IAM advice for organizations entering the post COVID world

SSO authentication - What it is and How does it work

Enabling Application Security through Effective Program Management

DDoS Simulations - A proactive exercise to prevent DDoS threats

Managed Detection and Response (MDR) - The proven way to mitigate sophisticated threats

Essential Guidelines to Secure Remote Access When Working from Home

Cybersecurity and Personal Hygiene Tips While Working from Home or a Remote Location

How Red Teaming Can Help You Reduce Cyber Attacks

Modernizing IAM - The strategic need to harness robotics

Ensure a higher level of security preparedness. Move from MSSP to MDR services.

Expert Tips for Managing a Cybersecurity Consulting Engagement

Securing applications and establishing publisher identities with automated code signing

Cybersecurity in the Kingdom of Saudi Arabia

10 Reasons Your Organization Needs Red Team Testing

Five-point mantra for a successful cybersecurity career

How to Effectively Automate and Implement GRC Solutions

Enabling your own Security Operations Center (SOC) maturity model – A DIY Guide

Fixing Security Loopholes and Securing Private Blockchains from Vulnerabilities

Risk Management and the Heisenberg’s Uncertainty Principle

Solving data challenges using vulnerability intelligence

NYDFS Cyber Security Regulations - Made Easy (Part 1)

NYDFS Cyber Security Regulations - Made Easy (Part 2)

Is Internet of Things becoming Internet of INSECURE Things?

Our Top 10 Cyber Security Predictions for 2017

NYDFS Cyber Security Regulations - Made Easy (Part 3 Final)

Sample RFP Questions on SOC Build/Optimization Services

Aujas Achieves Cert-In (India Computer Emergency Response Team) Empanelment For 2016-19

6 IoT Security Worries that could ruin your Internet-of-Things Party

10 Basic Things Every Organization MUST-DO for Cybersecurity

Managing Information Risk For Digital Age: Why It's Not About Security

Pokemon GO - Security lessons you just cannot afford to miss !

Why Security Analytics, What are Your Choices, and When?

Will a Bug Bounty Program Make Your Enterprise Secure?

Ten questions for CISOs to check whether their vulnerability management program is working

10 Ways CIOs & CISOs Can Beat Talent Crunch in Information Security

How to Make SIEM to Mitigate Advanced Threats ?

4 Immediate Changes to make Traditional Vulnerability Management to Work

Time to Re-think Vulnerability Management ? These 5 Facts Say So...

Know different Phishing tactics. Don’t get lured by them.

How can Internet of Things (IoT) Not become a pain-in-the-a$$ from a cyber security perspective?

30-Sec Guide: How to save from DROWNing?

Encounter with Mobile Malware

Mobile Phishing: Thief right in your pockets

Venom Vulnerablity

Logjam (CVE-2015-4000) – Are you FREAKed again?

Fundamentals of Secure Code Review - Part 1

Key learning from Security Breaches of 2014

How to design a Cryptographic Solution – Part 2

A Glimpse into Mobile Security

How to design a Cryptographic Solution - Part 1

FREAK Vulnerability (CVE-2015-0204)

Understanding and Testing Web Services- Part 1

Shadow-Utils to protect and store passwords in Linux

Aujas Security Analytics Platform wins laurels at DSCI Security Summit

The Escalating Trend in cyber-security

Understanding and Fixing the POODLE SSL Vulnerability (CVE­2014­3566)

SHELLSHOCK - [CVE-2014-6271]

Five Things You Ought to Know to Prevent a Vishing Attack

Aujas to Unveil Two New Information Security Services at IBM Pulse 2014

Aujas Raises Series B Funding

Aujas is now an Amazon Consulting Partner

BYOD and A

Emerging Trends in IT Security in 2014

Top Information Security Stories of 2013

Cloud Application Security consideration and Mitigation

Data Loss Prevention – A Technology or System?

Sisyphus meets Athena

India’s National Cyber-security Policy – A Perspective and Analysis

ISMS in a brave new world

Penetration Testing of Java Applets

How to hack through Phone Ring Test

How to integrate vulnerability risk into larger business risk using GRC tool

Data Centric World: Zen and the Art of Data Protection

No More Data Leaks- Tip 3: Telling is not enough, you have to show

No More Data Leaks - Tip 2: Does Data Classification Help

Data Centric World: A Common Sense Guide to Data Management

No More Data Leaks - Tip 1: Do a Data Leakage Assessment

Data Centric World: A Brief History of Data Protection

A Quick Test to find out if your Company is really serious about Security

Getting Your Data Leakage Protection Right

A Quick Overview of SAP NetWeaver Identity Management Solution

The Need for SAP Identity Management

Should Organizations be concerned about Open Source Software Compliance?

Identity and Access Management: Before and After Scenario

Securing B2C Mobile Applications

Identity and Access Management: Before and After Scenario

The Smooth Sailing Fallacy - CEO's Watch-Out - Your ERP may be Insecure!

High Performance SAP Security – Guard Your Business, Not Just Your SAP ERP

Aujas signs with Palamida to offer Intellectual Property and Security compliance services

Aujas wins NASSCOM EMERGE 50 2011 award and also Deloitte Technology Fast 50 India 2011 award

Managing Risk of Privileged Access and Activity Management

Consumerization is Real

Outlook for Mobile payment adoption in India is Bright, but Security is still a big concern

Aujas Opens New Office in California to Focus on Global Growth

Secure Software Development by Design

Mitigating Security Risks in USSD based Mobile Payment Applications

Windows Azure: Build Secure Applications by Design

Amazon EC2 Failures Are a Wakeup Call for Cloud Customers

Phishers Target Social Media, Are You the Victim?

Amazon EC2 Failures Are a Wakeup Call for Cloud Customers

Phishers Target Social Media, Are you the Victim?

The Business Case for Secure Development Lifecycle

Data-Breach Risk Is Not Only from Insider Threats

Data Protection and Controls – Does Format Really Matter?

Data Governance – What We Need to Think About

Cloud Computing – Security Threats and More...

Right to Internet Use

Right to Internet Use

Security Breaches Continue to Grow

Effective Data Protection Requires More than Technology

What Is Needed for Data Protection?

5 Hot Topics in Information Security for 2011

Service Oriented Architecture (SOA) Security in the Cloud

Secure Code Development Is in Your Future