Talk to Our Experts  

Information Risk Management Blog

Anupam Bonanthaya

Anupam Bonanthaya
Chief Marketing Officer @Aujas, Passionate about Information Risk & Security. Working with customers globally to help them secure their Most Valuable Asset - Information Assets.

Recent Posts

NYDFS Cyber Security Regulations - Made Easy (Part 3 Final)

[fa icon="calendar'] Feb 6, 2017 1:13:00 AM / by Anupam Bonanthaya posted in Cybersecurity, Banking, Risk & Compliance Advisory, NYDFS

[fa icon="comment"] 1 Comment

Now that the final regulations are out, and it will be effective starting March 1, 2017, if you are looking for an executive summary of the regulations, and if you are curious  about what changed between  the draft and the final one - here we go.

Read More [fa icon="long-arrow-right"]

Our Top 10 Cyber Security Predictions for 2017

[fa icon="calendar'] Dec 30, 2016 6:16:48 AM / by Anupam Bonanthaya posted in Cybersecurity, Information security, 2017

[fa icon="comment"] 0 Comments


It is that time of the year when you look back at the year that passed by and make predictions for the new year.

We did the same for what we love - Cyber Security, and listed the Top 10 for 2017 in the form of an infographic. Check out if it matches yours?

Read More [fa icon="long-arrow-right"]

NYDFS Cyber Security Regulations - Made Easy (Part 2)

[fa icon="calendar'] Dec 9, 2016 12:02:47 AM / by Anupam Bonanthaya posted in Cybersecurity, NYDFS, Security Regulations

[fa icon="comment"] 0 Comments

Being in the Financial Services industry, you must be already aware of the news about the proposed cyber security regulations by the New York Department of Financial Services (NYDFS).

In this article, we have tried to simplify the regulations by representing the 23 sections in the form of an infographic. 

Even though these regulations would be enforced only on those financial services companies coming under the scope of NYDFS, given that New York is seen as the financial capital of the world,  companies outside NY also see this as a global benchmark.

Read More [fa icon="long-arrow-right"]

NYDFS Cyber Security Regulations - Made Easy (Part 1)

[fa icon="calendar'] Dec 5, 2016 3:30:50 AM / by Anupam Bonanthaya posted in Cybersecurity, NYDFS, Security Regulations

[fa icon="comment"] 0 Comments

Being in the Financial Services industry, you must be already aware of the news about the proposed cyber security regulations by the New York Department of Financial Services (NYDFS).

In this article, we have tried to simplify the regulations by representing the 23 sections in the form of an infographic. 

Even though these regulations would be enforced only on those financial services companies coming under the scope of NYDFS, given that New York is seen as the financial capital of the world,  companies outside NY also see this as a global benchmark.

Read More [fa icon="long-arrow-right"]

What is Vulnerability Intelligence? The 5 Data Challenges It Solves.

[fa icon="calendar'] Sep 28, 2016 7:46:34 AM / by Anupam Bonanthaya posted in Vulnerability management, Vulnerability Intelligence, security assessment, Security testing

[fa icon="comment"] 0 Comments

There can be no argument about the fact that Vulnerability Management is one of the oldest problems in Information Security. There are many reasons why it has remained a problem, even today.

In this post I will cover what  Vulnerability Intelligence  is and what are those tough lingering problems that it attempts to address. (btw, it is not the same as Threat Intelligence).

Read More [fa icon="long-arrow-right"]

6 IoT Security Worries that could ruin your Internet-of-Things Party

[fa icon="calendar'] Sep 8, 2016 2:03:28 AM / by Anupam Bonanthaya posted in Digital Security, basics of digital security, IOT security

[fa icon="comment"] 0 Comments


Reported Security Incidents on IoT (Internet of Things) components have increased 152% between 2014 and 2015. Looks like it will be even higher at the end of 2016.

This is at a point where the number of smart devices is expected to jump 5 X from 5 Billion in 2015 to 25 Billion in 2020, conservatively speaking. 

Internet of Things is becoming a favourite target for cyber attackers, and it is a no-brainer to predict that it will only become worse. 

More Smart Devices = More (Sensitive) Data = Higher Risk

In this post, check out the 6 basic security concerns with Internet of Things that you need to pay attention to, in order to enjoy the ride without falling off the roller coaster.

Read More [fa icon="long-arrow-right"]

10 Basic Things Every Organization MUST-DO for Cybersecurity

[fa icon="calendar'] Aug 26, 2016 2:08:05 AM / by Anupam Bonanthaya posted in Cybersecurity, Cyber Security, Information security, basics of cyber security

[fa icon="comment"] 9 Comments


These days, it is a rarity if there is no news of a high profile cyber attack or breach every week or so. This week was the French Submarine builder DCNS who is building defense submarines for India, Australia, Malaysia and Chile.  Last week was SAGE. The week before was Oracle.

It is a common misconception that only high profile companies in specific industries get attacked. In reality every organization - big or small, across all industries is a target. Or that is what the data says.

The ones who hog the headlines just got lucky.  

We put together a check-list in an infographic format to cover the basics of information security. 10 basic things that every organization must pay attention to in-order to stay away from the headlines when it comes to cybersecurity.

Read More [fa icon="long-arrow-right"]

Pokemon GO - Security lessons you just cannot afford to miss !

[fa icon="calendar'] Jul 15, 2016 5:41:46 AM / by Anupam Bonanthaya posted in Application security, Security, Digital Security, Pokemon Go

[fa icon="comment"] 1 Comment

This week in technology has been disruptive to say the least !

Pokémon GO, a location-based augmented reality mobile game has broken all previous records.

The mobile app has become so popular that it has become a social media phenomenon.  

So much that it is something that has changed and united the world for once. Now we all have a reason to believe that this game can solve all our problems !

Not the gaming kinds? It is still worth paying attention because it impacts all of us. Read on to know how...

Read More [fa icon="long-arrow-right"]

Why Security Analytics, What are Your Choices, and When?

[fa icon="calendar'] Jul 13, 2016 1:32:09 AM / by Anupam Bonanthaya posted in Information security, SIEM, security analytics, SAVPbyAujas

[fa icon="comment"] 0 Comments

By today i.e. 2016, 1/4th of large global companies are expected to have adopted big data analytics for at-least one security use case! (source: Gartner)

If you belong to the remaining 75% majority OR even if you are in the 25% but got it all wrong the 1st time around - please read-on

 

Read More [fa icon="long-arrow-right"]

Will a Bug Bounty Program Make Your Enterprise Secure?

[fa icon="calendar'] Jun 28, 2016 3:30:35 AM / by Anupam Bonanthaya posted in Cybersecurity, Vulnerability management, vulnerabilities, responsible disclosure, Threat Management, bug bounty

[fa icon="comment"] 2 Comments


What is common between "Hacking the Pentagon" and "Hacking Google CEO's Quora account"?

It is Bug Bounties ! The former was a super successful bounty program run by the US government last month. The latter is a hacking incident this week, "in-spite" of Quora having a bounty program.

So the million $ security question - If you are an enterprise CISO, should you go for a bug bounty program?

Read More [fa icon="long-arrow-right"]
     

Subscribe