<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.aujas.com/making-identity-solutions-simple-for-hybrid-environments</loc><lastmod>2024-06-05</lastmod></url><url><loc>https://blog.aujas.com/2010/11/04/converged-access-control/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2010/11/03/secure-file-uploads-risky/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2011/02/22/right-to-internet-use-2/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/2010/05/05/social-networking-security/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/penetration-testing-java-applets</loc><lastmod>2020-10-29</lastmod></url><url><loc>https://blog.aujas.com/digital-forensics-incident-response</loc><lastmod>2021-07-02</lastmod></url><url><loc>https://blog.aujas.com/microsoft-cloud-app-security</loc><lastmod>2021-07-02</lastmod></url><url><loc>https://blog.aujas.com/2012/09/05/data-leaks-tip-3-telling-enough-show/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/blog</loc><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/close.png</image:loc><image:caption>close</image:caption><image:title>close</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Logo-1.webp</image:loc><image:caption>AujasLogo1</image:caption><image:title>AujasLogo1</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i2.png</image:loc><image:caption>i2</image:caption><image:title>i2</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i6.png</image:loc><image:caption>i6</image:caption><image:title>i6</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/blue-search.png</image:loc><image:caption>bluesearch</image:caption><image:title>bluesearch</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i1.png</image:loc><image:caption>i1</image:caption><image:title>i1</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Cybersecurity%20Logo%202024.webp</image:loc><image:caption>AujasCybersecurityLogo2024</image:caption><image:title>AujasCybersecurityLogo2024</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i5.png</image:loc><image:caption>i5</image:caption><image:title>i5</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Footer/Footer-Logo.png</image:loc><image:caption>FooterLogo</image:caption><image:title>FooterLogo</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i4.png</image:loc><image:caption>i4</image:caption><image:title>i4</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i3.png</image:loc><image:caption>i3</image:caption><image:title>i3</image:title></image:image><lastmod>2023-08-29</lastmod></url><url><loc>https://blog.aujas.com/2011/01/24/more-effective-data-protection/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2013/09/11/cloud-application-security-consideration-mitigation/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/securing-devops-with-devsecops</loc><lastmod>2022-01-06</lastmod></url><url><loc>https://blog.aujas.com/2012/05/30/a_quick_overview_of_sap_netweaver_identity_management_solution/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/zero-trust-cybersecurity</loc><lastmod>2024-12-04</lastmod></url><url><loc>https://blog.aujas.com/security-operations-center-maturity-a-step-by-step-diy-guide</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/2012/02/28/identity-access-management-scenario/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/webinar/data-protection-working-with-dlp-and-erm</loc><lastmod>2018-05-07</lastmod></url><url><loc>https://blog.aujas.com/2009/10/26/the-long-tail-of-security-2/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/case-study/mobile-banking-made-safe/</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/2013/01/10/hack-phone-ring-test/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/2011/06/21/secure-software-development-by-design/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2011/05/20/windows-azure-build-secure-applications-by-design/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/what-is-vulnerability-intelligence</loc><lastmod>2021-06-11</lastmod></url><url><loc>https://blog.aujas.com/case-study/techno-risk-assessment-for-large-banking-client</loc><lastmod>2016-07-29</lastmod></url><url><loc>https://blog.aujas.com/news/aujas-opens-centre-to-help-foil-cyberattacks</loc><lastmod>2018-07-25</lastmod></url><url><loc>https://blog.aujas.com/rapid-reset-attacks-a-call-to-action-for-http-user</loc><lastmod>2023-12-03</lastmod></url><url><loc>https://blog.aujas.com/case-study/on-demand-security-assessment-for-leading-general-insurance-company</loc><lastmod>2016-07-29</lastmod></url><url><loc>https://blog.aujas.com/4-changes-to-make-traditional-vulnerability-management-program-to-work-today</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/casestudy-new/siem-is-dead-long-live</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/2014/03/01/byod-and-a/</loc><lastmod>2020-10-28</lastmod></url><url><loc>https://blog.aujas.com/2010/11/22/vulnerability-management/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2009/11/08/the-long-tail-of-security/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/news/cybersecurity-an-armour-to-the-healthcare-sector</loc><lastmod>2018-11-21</lastmod></url><url><loc>https://blog.aujas.com/case-study/data-protection-program-implementation-for-one-of-the-worlds-largest-banks</loc><lastmod>2016-07-28</lastmod></url><url><loc>https://blog.aujas.com/devsecops-integration-with-devops</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/managing-information-risk-for-the-digital-age-why-it-is-not-about-security</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/iam-advice-for-organizations-entering-the-post-covid-world</loc><lastmod>2020-12-15</lastmod></url><url><loc>https://blog.aujas.com/2010/09/07/the-curse-of-compliance/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/webinar/common-mistakes-and-lessons-learned-in-securing-cloud-based-applications</loc><lastmod>2018-05-07</lastmod></url><url><loc>https://blog.aujas.com/transitioning-from-mssp-to-managed-detection-response-services</loc><lastmod>2021-01-04</lastmod></url><url><loc>https://blog.aujas.com/2012/09/05/data-centric-world-zen-art-data-protection/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/linux-password-storage</loc><lastmod>2020-12-04</lastmod></url><url><loc>https://blog.aujas.com/cyber-defense-center-capabilities</loc><lastmod>2021-08-31</lastmod></url><url><loc>https://blog.aujas.com/how-to-effectively-automate-and-implement-grc-solutions</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/engineering-security-transformation-through-cyber-defense-center</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/2011/01/11/soa-security-in-the-cloud/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/converged-identity-and-access-management</loc><lastmod>2021-06-11</lastmod></url><url><loc>https://blog.aujas.com/six-essential-reasons-every-business-needs-an-isap</loc><lastmod>2025-02-26</lastmod></url><url><loc>https://blog.aujas.com/2015/04/27/a-glimpse-into-mobile-security/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/2011/07/26/managing-risk-of-privileged-access-and-activity-management/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/news/facebook-breach-how-should-india-react</loc><lastmod>2018-11-21</lastmod></url><url><loc>https://blog.aujas.com/2010/11/29/trends-in-phishing/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/news/the-need-for-devsecops-culture-and-the-way-forward</loc><lastmod>2018-11-21</lastmod></url><url><loc>https://blog.aujas.com/webinar/mobile-app-development-differences-from-traditional-approach</loc><lastmod>2018-05-07</lastmod></url><url><loc>https://blog.aujas.com/news/aujas-opens-security-operations-centre-in-bangalore</loc><lastmod>2018-07-25</lastmod></url><url><loc>https://blog.aujas.com/cybersecurity-and-personal-hygiene-tips-while-working-from-home</loc><lastmod>2020-11-06</lastmod></url><url><loc>https://blog.aujas.com/essential-guidelines-to-secure-remote-access-when-working-from-home</loc><lastmod>2020-11-12</lastmod></url><url><loc>https://blog.aujas.com/2015/05/27/fundamentals-of-secure-code-review-part-1/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/case-study/security-intelligence-and-log-analysis-aujas-approach-and-competency-with-ibm-qradar/</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/news/information-security-governance-fundamental-to-stall-cyber-attacks-in-pharma-industry-jaykishan-nirmal</loc><lastmod>2018-11-21</lastmod></url><url><loc>https://blog.aujas.com/cybersecurity-transformation-managed-detection-response</loc><lastmod>2020-09-29</lastmod></url><url><loc>https://blog.aujas.com/protecting-your-organization-from-moveit-vulnerabilities</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/2012/06/18/quick-test-find-company-security/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/2013/09/04/data-loss-prevention-technology-system/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/sso-authentication-what-it-is-and-how-does-it-work</loc><lastmod>2020-04-17</lastmod></url><url><loc>https://blog.aujas.com/2012/03/26/sap-identity-management/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/2011/01/04/cloud-operating-risks/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/2015/06/30/venom-vulnerability-cve-2015-3456/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/ciso-vulnerability-management-program-questions</loc><lastmod>2020-11-02</lastmod></url><url><loc>https://blog.aujas.com/2010/10/13/curbing-access-risk-role-based-access-governance/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/2011/04/27/amazon-ec2-failures-are-a-wakeup-call-for-cloud-customers/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/struggling-with-security-bottlenecks-in-sdlc</loc><lastmod>2024-06-19</lastmod></url><url><loc>https://blog.aujas.com/2010/11/15/privacy-in-the-cloud/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/what-is-a-bug-bounty-program-should-an-enterprise-have-a-bug-bounty-program</loc><lastmod>2019-12-10</lastmod></url><url><loc>https://blog.aujas.com/2015/08/27/mobile-phishing-thief-right-in-your-pockets/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/webinar/a-closer-look-at-aadhaar-enabled-payments-systems-know-the-unknowns</loc><lastmod>2018-05-07</lastmod></url><url><loc>https://blog.aujas.com/automated-code-signing</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/case-study/turning-a-banks-dlp-from-a-liability-to-an-asset/</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/the-roi-of-intelligent-access-management</loc><lastmod>2025-03-11</lastmod></url><url><loc>https://blog.aujas.com/xsoar-for-threat-intel-transformation</loc><lastmod>2021-05-17</lastmod></url><url><loc>https://blog.aujas.com/penetration-testing-to-fix-security-vulnerabilities</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/case-study/retail-giant-eliminates-data-leakage-threats-2/</loc><lastmod>2016-06-24</lastmod></url><url><loc>https://blog.aujas.com/sample-rfp-questions-soc-build/optimization-services</loc><lastmod>2021-01-12</lastmod></url><url><loc>https://blog.aujas.com/2015/03/23/how-to-design-a-cryptographic-solution/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/blog/siem-is-dead-long-live-siem1</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/2014/05/02/five-things-you-ought-to-know-to-prevent-a-vishing-attack/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/2009/12/16/the-four-diplomatic-principles/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/2011/03/08/data-governance/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2011/04/11/secure-development-lifecycle/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/microsoft-azure-security-services</loc><lastmod>2022-07-01</lastmod></url><url><loc>https://blog.aujas.com/cloud-native-siem-soar-solutions</loc><lastmod>2021-06-09</lastmod></url><url><loc>https://blog.aujas.com/2010/06/17/psychometric-analysis-developers-and-security-testers/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/2010/11/15/physical-security-controls/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2011/12/21/the-smooth-sailing-fallacy-ceos-watch-out-your-erp-may-be-insecure/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/2014/10/06/shellshock-part-1/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/2014/02/24/top-information-security-stories-2013/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/antivirus-managed-endpoint-detection-and-response-services</loc><lastmod>2020-09-29</lastmod></url><url><loc>https://blog.aujas.com/2015/05/27/key-learning-from-security-breaches-of-2014/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/five-point-mantra-for-a-successful-cybersecurity-career</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/news/devsecops-the-keys-to-success</loc><lastmod>2018-08-22</lastmod></url><url><loc>https://blog.aujas.com/webinar/securing-information-on-mobile-devices</loc><lastmod>2018-05-07</lastmod></url><url><loc>https://blog.aujas.com/aujas-partners-with-thales-for-secure-code-sign-solutions</loc><lastmod>2024-09-09</lastmod></url><url><loc>https://blog.aujas.com/webinar/privileged-access-and-activity-management-challenges-and-solutions</loc><lastmod>2018-05-07</lastmod></url><url><loc>https://blog.aujas.com/more-signal-less-noise-harnessing-iam-kpis</loc><lastmod>2024-05-16</lastmod></url><url><loc>https://blog.aujas.com/case-study/turning-a-banks-dlp-from-a-liability-to-an-asset-2/</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/penetration-testing-for-cloud-security</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/spiderman-artificial-intelligence-and-iam</loc><lastmod>2024-11-28</lastmod></url><url><loc>https://blog.aujas.com/the-future-of-third-party-risk-management</loc><lastmod>2025-07-02</lastmod></url><url><loc>https://blog.aujas.com/tips-cybersecurity-consulting-engagements</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/casestudy-new/security-operations-center-maturity-a-step-by-step-diy-guide</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/2011/03/08/data-protection-controls/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2016/03/30/internet-of-things-iot-how-can-it-not-become-a-pain-in-the-a-from-a-cyber-security-perspe</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2011/06/30/aujas-new-office-california/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/addressing-unique-iam-challenges-in-higher-education</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/10-things-every-organization-must-do-for-cyber-security-2016</loc><lastmod>2019-10-09</lastmod></url><url><loc>https://blog.aujas.com/2011/01/24/data-protection/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/maximize-iam-efficiency-with-strategic-kpis</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://blog.aujas.com/2014/03/01/24/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/zero-trust-security</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/2011/01/04/secure-code-development/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/news/sameer-shelke-cofounder-cto-aujas-gets-elected-into-forbes-technology-council</loc><lastmod>2018-06-18</lastmod></url><url><loc>https://blog.aujas.com/2011/05/03/amazon-ec2-failures-are-a-wakeup-call-for-cloud-customers-2/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/penetration-testing-deep-exploit</loc><lastmod>2021-07-19</lastmod></url><url><loc>https://blog.aujas.com/power-of-siem-soar</loc><lastmod>2020-12-09</lastmod></url><url><loc>https://blog.aujas.com/ot-security</loc><lastmod>2022-11-11</lastmod></url><url><loc>https://blog.aujas.com/endpoint-security-msdefender-atp</loc><lastmod>2021-04-29</lastmod></url><url><loc>https://blog.aujas.com/using-generative-ai-genai-for-enhanced-threat-detection-and-response</loc><lastmod>2024-05-10</lastmod></url><url><loc>https://blog.aujas.com/case-study/mobile-application-security-assessment/</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/2014/03/01/aujas-is-now-an-amazon-consulting-partner/</loc><lastmod>2020-10-28</lastmod></url><url><loc>https://blog.aujas.com/2012/06/26/data-centric-world-history-data-protection-2/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/news/the-monsoon-cloud-in-india</loc><lastmod>2018-08-22</lastmod></url><url><loc>https://blog.aujas.com/how-vendor-related-breaches-are-shaping-cybersecurity-strategies-in-2025</loc><lastmod>2025-05-19</lastmod></url><url><loc>https://blog.aujas.com/2015/04/30/how-to-design-a-cryptographic-solution-2/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/mobile-application-penetration-testing</loc><lastmod>2021-01-07</lastmod></url><url><loc>https://blog.aujas.com/cyber-defense-center-virtual-launch-recap</loc><lastmod>2021-03-29</lastmod></url><url><loc>https://blog.aujas.com/2013/08/01/indias-national-cyber-security-policy-perspective-analysis/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/webinar/data-loss-prevention-from-strategy-to-execution-clearing-the-confusion</loc><lastmod>2018-05-07</lastmod></url><url><loc>https://blog.aujas.com/2014/02/24/emerging-trends-security-2014/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/casestudy-new/siem-is-dead-long-live-siem</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/blog/security-operations-center-maturity-a-step-by-step-diy</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/machine-identities-a-key-element-of-zero-trust-strategies</loc><lastmod>2024-09-02</lastmod></url><url><loc>https://blog.aujas.com/enhancing-threat-detection-analysis-and-response-with-google-secops</loc><lastmod>2024-08-29</lastmod></url><url><loc>https://blog.aujas.com/case-study/aujas-rsa-archer-center-of-excellence/</loc><lastmod>2016-10-25</lastmod></url><url><loc>https://blog.aujas.com/news/laser-sharp-focus-plus-global-delivery-aujas-listed-in-two-gartner-market-guides-for-iam-professional-services-north-america-and-europe-middle-east-and-africa-1</loc><lastmod>2017-11-10</lastmod></url><url><loc>https://blog.aujas.com/2014/03/01/aujas-raises-series-b-funding/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/case-study/risk-management-automation-for-a-leading-us-bank-rsa-archer</loc><lastmod>2016-11-04</lastmod></url><url><loc>https://blog.aujas.com/2010/11/08/how-i-hacked-car-manufacturer/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/adapting-access-governance-in-the-age-of-generative-ai</loc><lastmod>2024-09-02</lastmod></url><url><loc>https://blog.aujas.com/2010/02/15/economics-of-security/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/aujas-achieves-cert-in-empanelment</loc><lastmod>2021-06-11</lastmod></url><url><loc>https://blog.aujas.com/how-to-make-siem-to-mitigate-advanced-threats</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/security-lessons-you-just-cannot-miss-from-pokemon-go-experience</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/customer-identity-access-management</loc><lastmod>2022-08-01</lastmod></url><url><loc>https://blog.aujas.com/how-to-mitigate-insider-threats-with-siem-ueba</loc><lastmod>2020-07-20</lastmod></url><url><loc>https://blog.aujas.com/2015/06/30/logjam-cve-2015-4000-are-you-freaked-again/</loc><lastmod>2020-11-04</lastmod></url><url><loc>https://blog.aujas.com/ddos-simulations-a-proactive-exercise-to-prevent-ddos-threats</loc><lastmod>2021-03-01</lastmod></url><url><loc>https://blog.aujas.com/2009/09/29/our-psychology-and-security-the-way-we-think/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/modernizing-security-operations</loc><lastmod>2025-04-07</lastmod></url><url><loc>https://blog.aujas.com/2015/01/28/aujas-security-analytics-platform-wins-laurels-at-dsci-security-summit/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/2012/01/21/securing-b2c-mobile-applications/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/case-study/secure-code-review-of-mobile-apps-for-us-based-leading-payment-provider/</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/2011/01/24/5-information-security-hot-topics/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2011/10/05/aujas-signs-with-palamida-to-offer-intellectual-property-and-security-compliance-services</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/how-red-teaming-can-help-you-reduce-cyber-attacks</loc><lastmod>2020-11-11</lastmod></url><url><loc>https://blog.aujas.com/case-study/archer-egrc-automation-for-a-large-telecom-client/</loc><lastmod>2016-09-13</lastmod></url><url><loc>https://blog.aujas.com/mitigate-risks-using-threat-intelligence</loc><lastmod>2021-01-05</lastmod></url><url><loc>https://blog.aujas.com/mitigating-ussd-security-risks</loc><lastmod>2020-11-26</lastmod></url><url><loc>https://blog.aujas.com/news</loc><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Footer/Footer-Logo.png</image:loc><image:caption>FooterLogo</image:caption><image:title>FooterLogo</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Biometric.jpg</image:loc><image:caption>Biometric</image:caption><image:title>Biometric</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/analysis-india-post-payment-bank-postmen-as-bankers-showcase_image-4-a-11470.jpg</image:loc><image:caption>analysisindiapostpaymentbankpostmenasbankersshowcaseimage4a11470</image:caption><image:title>analysisindiapostpaymentbankpostmenasbankersshowcaseimage4a11470</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Cybersecurity%20Logo%202024.webp</image:loc><image:caption>AujasCybersecurityLogo2024</image:caption><image:title>AujasCybersecurityLogo2024</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/close.png</image:loc><image:caption>close</image:caption><image:title>close</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/blue-search.png</image:loc><image:caption>bluesearch</image:caption><image:title>bluesearch</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Logo-1.webp</image:loc><image:caption>AujasLogo1</image:caption><image:title>AujasLogo1</image:title></image:image><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2012/07/19/data-leaks-tip-1-data-leakage-assessment/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/webinar/web-session-management-in-real-world-what-vulnerabilities-lie-ahead</loc><lastmod>2018-05-07</lastmod></url><url><loc>https://blog.aujas.com/2010/12/21/consumerization-of-the-enterprise/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/case-study/our-methodology-provides-the-insurance-for-an-effective-dlp-implementation/</loc><lastmod>2016-07-11</lastmod></url><url><loc>https://blog.aujas.com/case-study/security-analytics-and-visualization-platform-savp/</loc><lastmod>2016-06-24</lastmod></url><url><loc>https://blog.aujas.com/2015/01/13/the-escalating-trend-in-cyber-security/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/10-ways-cios-and-cisos-can-beat-talent-crunch-in-information-security-industry</loc><lastmod>2019-12-10</lastmod></url><url><loc>https://blog.aujas.com/overcoming-siem-challenges-to-thwart-todays-security-threats</loc><lastmod>2020-06-29</lastmod></url><url><loc>https://blog.aujas.com/webinar/secure-by-design-model-for-software-security</loc><lastmod>2018-05-07</lastmod></url><url><loc>https://blog.aujas.com/the-future-of-api-security-trends-and-best-practices</loc><lastmod>2025-02-27</lastmod></url><url><loc>https://blog.aujas.com/2011/02/23/cloud-computing-security-threats/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/webinar/vulnerability-management-taking-it-to-the-next-level</loc><lastmod>2018-05-07</lastmod></url><url><loc>https://blog.aujas.com/integrated-security-the-iam-and-pam-synergy</loc><lastmod>2024-05-17</lastmod></url><url><loc>https://blog.aujas.com/how-to-detect-and-prevent-data-loss-due-to-remote-work</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/top-cybersecurity-trends-shaping-the-industry-in-2025</loc><lastmod>2025-07-04</lastmod></url><url><loc>https://blog.aujas.com/2010/11/04/cyber-crime/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2011/04/27/phishers-target-social-media-are-you-the-victim/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/casestudy-new/security-operations-center-maturity-a-step-by-step-diy</loc><lastmod>2019-01-23</lastmod></url><url><loc>https://blog.aujas.com/from-convolution-to-evolution</loc><lastmod>2025-04-25</lastmod></url><url><loc>https://blog.aujas.com/2013/08/19/sisyphus-meets-athena/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/sca-open-source-code</loc><lastmod>2022-01-25</lastmod></url><url><loc>https://blog.aujas.com/2014/11/03/understanding-and-fixing-the-poodle-ssl-vulnerability-cve20143566/</loc><lastmod>2020-11-01</lastmod></url><url><loc>https://blog.aujas.com/our-top-10-cyber-security-predictions-for-2017</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/case-study/retail-giant-eliminates-data-leakage-threats/</loc><lastmod>2016-07-11</lastmod></url><url><loc>https://blog.aujas.com/transforming-identity-and-access-management-with-intelligent-iam-solutions</loc><lastmod>2025-05-05</lastmod></url><url><loc>https://blog.aujas.com/2010/12/20/wikileaks-fallout-and-dlp/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/case-study/information-security-program-evaluation-to-meet-regulatory-requirements-for-a-commercial-bank/</loc><lastmod>2016-06-28</lastmod></url><url><loc>https://blog.aujas.com/news/pc-quest-we-are-trying-to-be-the-single-pane-of-glass-for-large-enterprises</loc><lastmod>2018-06-18</lastmod></url><url><loc>https://blog.aujas.com/2011/12/21/identity-and-access-management-before-and-after-scenario/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/2011/01/04/data-in-the-cloud/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2012/08/09/data-leaks-tip-2-data-classification/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/2011/01/31/more-security-breaches/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/case-study/data-protection-program-implementation-for-one-of-the-worlds-banks/</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/2010/11/04/understanding-the-need-for-converged-access-control-2/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/case-study/solution-design-implementation-for-managing-privileged-ids-in-telecom-environment/</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/palm-smart-onboard-and-integration</loc><lastmod>2025-06-02</lastmod></url><url><loc>https://blog.aujas.com/2009/11/13/the-colombo-experience-learnings-for-our-security-posture/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/defending-your-data-the-value-of-crest-accreditation-in-penetration-testing</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://blog.aujas.com/casestudy-new/sample-post</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/2012/03/22/organizations-concerned-open-source-software-compliance/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/news/justice-srikrishna-committee-recommends-2-4-of-companys-worldwide-revenue-as-penalty-for-any-data-breach</loc><lastmod>2018-08-22</lastmod></url><url><loc>https://blog.aujas.com/news/analysis-india-post-payment-bank-postmen-as-bankers</loc><lastmod>2018-09-14</lastmod></url><url><loc>https://blog.aujas.com/security-orchestration-automation-and-response</loc><lastmod>2021-05-31</lastmod></url><url><loc>https://blog.aujas.com/navigating-regulatory-challenges-in-third-party-risk-management</loc><lastmod>2025-06-09</lastmod></url><url><loc>https://blog.aujas.com/case-study/information-security-incident-management-framework-for-a-large-oil-gas-client</loc><lastmod>2016-08-04</lastmod></url><url><loc>https://blog.aujas.com/2015/03/18/freak-vulnerability-cve-2015-0204/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/cybersecurity-in-the-kingdom-of-saudi-arabia</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/cloud-security-testing-red-team-assessment</loc><lastmod>2021-02-22</lastmod></url><url><loc>https://blog.aujas.com/2011/04/01/data-breach-risk/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2010/11/29/pci-dss/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/it-amendment-act-2008-modifying-it-act-2000</loc><lastmod>2020-10-23</lastmod></url><url><loc>https://blog.aujas.com/webinar</loc><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/blue-search.png</image:loc><image:caption>bluesearch</image:caption><image:title>bluesearch</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Footer/Footer-Logo.png</image:loc><image:caption>FooterLogo</image:caption><image:title>FooterLogo</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/webinar-nov-2012.jpg</image:loc><image:caption>webinarnov2012</image:caption><image:title>webinarnov2012</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/webinar-5.png</image:loc><image:caption>webinar5</image:caption><image:title>webinar5</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/webinar-october-2013.png</image:loc><image:caption>webinaroctober2013</image:caption><image:title>webinaroctober2013</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/webinar-2.png</image:loc><image:caption>webinar2</image:caption><image:title>webinar2</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/phishinix.png</image:loc><image:caption>phishinix</image:caption><image:title>phishinix</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/webinar-3.png</image:loc><image:caption>webinar3</image:caption><image:title>webinar3</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/webinar-4.png</image:loc><image:caption>webinar4</image:caption><image:title>webinar4</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Logo-1.webp</image:loc><image:caption>AujasLogo1</image:caption><image:title>AujasLogo1</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/close.png</image:loc><image:caption>close</image:caption><image:title>close</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/webinar-april-2013.jpg</image:loc><image:caption>webinarapril2013</image:caption><image:title>webinarapril2013</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Cybersecurity%20Logo%202024.webp</image:loc><image:caption>AujasCybersecurityLogo2024</image:caption><image:title>AujasCybersecurityLogo2024</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/secure.jpg</image:loc><image:caption>secure</image:caption><image:title>secure</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/webinar-1.png</image:loc><image:caption>webinar1</image:caption><image:title>webinar1</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/webinar-septembe-2013.jpg</image:loc><image:caption>webinarseptembe2013</image:caption><image:title>webinarseptembe2013</image:title></image:image><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2011/02/23/right-to-internet-use/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/cyber-defense-center-versus-security-operations-center</loc><lastmod>2021-08-31</lastmod></url><url><loc>https://blog.aujas.com/risk-management-and-the-heisenbergs-uncertainty-principle</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/2011/07/06/outlook-for-mobile-payment-adoption-in-india-is-bright-but-security-is-still-a-big-concer</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/fixing-security-loopholes-and-securing-private-blockchains-from-vulnerabilities</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/blog/6-security-loopholes-that-threaten-private-blockchains-with-tips-to-secure-yours-against-vulnerabilities</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/cybersecurity-manufacturing-industry</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/cloud-security-digital-transformation</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://blog.aujas.com/mitigate-cloud-security-risks</loc><lastmod>2020-11-18</lastmod></url><url><loc>https://blog.aujas.com/news/data-security-incidents-prompt-organizations-to-improve-their-security-standards</loc><lastmod>2018-08-22</lastmod></url><url><loc>https://blog.aujas.com/2015/08/27/encounter-with-mobile-malware/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/is-internet-of-things-becoming-internet-of-insecure-things</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/2011/10/05/aujas-wins-nasscom-emerge-50-2011-award-and-also-deloitte-technology-fast-50-india-2011-a</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/2012/05/31/data-leakage-protection-2/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/india-personal-data-protection-bill-compliance</loc><lastmod>2022-06-03</lastmod></url><url><loc>https://blog.aujas.com/roi-account-aggregator-ecosystem</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/circumventing-automated-cyberattacks-with-soar</loc><lastmod>2021-01-27</lastmod></url><url><loc>https://blog.aujas.com/nydfs-cyber-security-regulations-made-easy-part-2-infographic</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/2010/11/04/stuxnet-accelerates-exponential-decay/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/nydfs-cyber-security-regulations-made-easy-part-1-infographic</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/enhancing-api-security-with-ai-ml-a-critical-imperative</loc><lastmod>2025-03-19</lastmod></url><url><loc>https://blog.aujas.com/debunking-iam-myths-what-you-should-know</loc><lastmod>2025-04-07</lastmod></url><url><loc>https://blog.aujas.com/case-study/bpo-gains-competitive-advantage-and-mitigates-access-risk-by-using-identity-management</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/case-study/our-methodology-provides-the-insurance-for-an-effective-dlp-implementation-2/</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/blog/siem-is-dead-long-live-siem</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/webinar/are-your-employees-falling-into-the-phishing-trap-learn-how-to-mitigate-risk-of-spear-phishing</loc><lastmod>2018-05-07</lastmod></url><url><loc>https://blog.aujas.com/improve-security-operations-with-xdr</loc><lastmod>2022-01-06</lastmod></url><url><loc>https://blog.aujas.com/news/aujas-launches-saas-based-iot-platform-for-registered-device-management-for-uidai</loc><lastmod>2017-03-08</lastmod></url><url><loc>https://blog.aujas.com/kubernetes-security</loc><lastmod>2022-02-16</lastmod></url><url><loc>https://blog.aujas.com/aujas-cdc-ibm-qradar</loc><lastmod>2022-08-01</lastmod></url><url><loc>https://blog.aujas.com/the-mitre-attck-approach-for-effective-red-team-simulations</loc><lastmod>2020-10-28</lastmod></url><url><loc>https://blog.aujas.com/casestudy-new/6-security-loopholes-that-threaten-private-blockchains-with-tips-to-secure-yours-against-vulner</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/2010/12/07/single-sign-on/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/managed-detection-and-response-infographic</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/fundamentals-of-code-sign-process</loc><lastmod>2023-05-16</lastmod></url><url><loc>https://blog.aujas.com/why-big-data-security-analytics-what-are-my-choices-and-when-to-opt-for-which-one</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/combatting-alert-fatigue-in-organizations-with-automation-and-soar</loc><lastmod>2023-09-28</lastmod></url><url><loc>https://blog.aujas.com/2012/07/31/data-centric-world-common-sense-guide-data-management/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/blog/6-security-loopholes-that-threaten-private-blockchains-with-tips-to-secure-yours-against-vulnera</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/before-the-breach-an-insider-guide-to-red-teaming-assessments</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://blog.aujas.com/case-study/archer-egrc-automation-for-a-large-telecom-client-2/</loc><lastmod>2016-06-24</lastmod></url><url><loc>https://blog.aujas.com/news/sme-channels-security-strategy-depends-on-the-cloud-model-one-plans-to-deploy</loc><lastmod>2018-06-18</lastmod></url><url><loc>https://blog.aujas.com/casestudy-new/6-security-loopholes-that-threaten-private-blockchains-with-tips-to-secure-yours-against-vulnerabilities</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/2010/11/08/security-breaches-increase/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/case-study/securing-enterprise-mobility/</loc><lastmod>2016-06-24</lastmod></url><url><loc>https://blog.aujas.com/blog/security-operations-center-maturity-a-step-by-step-diy-guide</loc><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/case-study</loc><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/Information-Security-Incident-Management-Framework-for-a-Large-Oil-Gas-Client.jpg</image:loc><image:caption>InformationSecurityIncidentManagementFrameworkforaLargeOilGasClient</image:caption><image:title>InformationSecurityIncidentManagementFrameworkforaLargeOilGasClient</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/Our-Methodology-Provides-the-Necessary-Insurance-for-an-Effective-DLP-Implementation.jpg</image:loc><image:caption>OurMethodologyProvidestheNecessaryInsuranceforanEffectiveDLPImplementation</image:caption><image:title>OurMethodologyProvidestheNecessaryInsuranceforanEffectiveDLPImplementation</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/Archer-eGRC-Automatior-for-Large-Telecom-Client.jpg</image:loc><image:caption>ArchereGRCAutomatiorforLargeTelecomClient</image:caption><image:title>ArchereGRCAutomatiorforLargeTelecomClient</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Digital_Security_-_Success_Story_-_Secure_Code_Review_of_The_Things_13Sep2016.png</image:loc><image:caption>DigitalSecuritySuccessStorySecureCodeReviewofTheThings13Sep2016</image:caption><image:title>DigitalSecuritySuccessStorySecureCodeReviewofTheThings13Sep2016</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/SAVP_Brochure.jpg</image:loc><image:caption>SAVPBrochure</image:caption><image:title>SAVPBrochure</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/Information-Security-Program-Evaluation-to-Meet-Regulatory-Requirements-for-a-Commercial-Bank.jpg</image:loc><image:caption>InformationSecurityProgramEvaluationtoMeetRegulatoryRequirementsforaCommercialBank</image:caption><image:title>InformationSecurityProgramEvaluationtoMeetRegulatoryRequirementsforaCommercialBank</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/Retail-Giant-Eliminates-Data-Leakage-Threats.jpg</image:loc><image:caption>RetailGiantEliminatesDataLeakageThreats</image:caption><image:title>RetailGiantEliminatesDataLeakageThreats</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Footer/Footer-Logo.png</image:loc><image:caption>FooterLogo</image:caption><image:title>FooterLogo</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/Solution-Design-and-Implementation.jpg</image:loc><image:caption>SolutionDesignandImplementation</image:caption><image:title>SolutionDesignandImplementation</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/close.png</image:loc><image:caption>close</image:caption><image:title>close</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/blue-search.png</image:loc><image:caption>bluesearch</image:caption><image:title>bluesearch</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/powering-the-vendor-risk-program-of-a-leading-international-bank.jpg</image:loc><image:caption>poweringthevendorriskprogramofaleadinginternationalbank</image:caption><image:title>poweringthevendorriskprogramofaleadinginternationalbank</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/Aujas_RSA_Archer_CoE_Services_Brief_LK_FINAL_Page_1-1.jpg</image:loc><image:caption>AujasRSAArcherCoEServicesBriefLKFINALPage11</image:caption><image:title>AujasRSAArcherCoEServicesBriefLKFINALPage11</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Logo-1.webp</image:loc><image:caption>AujasLogo1</image:caption><image:title>AujasLogo1</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/RAS%20-%20US%20Banking%20Case%20Studies%20v3-%2004Nov2016-400.png</image:loc><image:caption>RASUSBankingCaseStudiesv304Nov2016400</image:caption><image:title>RASUSBankingCaseStudiesv304Nov2016400</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Cybersecurity%20Logo%202024.webp</image:loc><image:caption>AujasCybersecurityLogo2024</image:caption><image:title>AujasCybersecurityLogo2024</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas_April2016-theme/images/Turning-Bank-DLP-from-Liability-into-an-Asset.jpg</image:loc><image:caption>TurningBankDLPfromLiabilityintoanAsset</image:caption><image:title>TurningBankDLPfromLiabilityintoanAsset</image:title></image:image><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2010/05/31/addressing-phishing-risk/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/nydfs-cyber-security-regulations-made-easy-part-3-infographic</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/2010/11/08/converged-id-access-management-2/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/importance-of-cspm</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/managed-detection-response-mitigating-security-threats</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/news/aujas-to-present-risk-assessment-and-treatment-solution-at-rsa-charge-2017-conference-dallas-tx</loc><lastmod>2017-10-11</lastmod></url><url><loc>https://blog.aujas.com/news/aujas-achieves-crest-membership-for-penetration-testing-services</loc><lastmod>2020-08-24</lastmod></url><url><loc>https://blog.aujas.com/identity-governance</loc><lastmod>2023-03-02</lastmod></url><url><loc>https://blog.aujas.com/iam-robotic-process-automation</loc><lastmod>2023-03-02</lastmod></url><url><loc>https://blog.aujas.com/2013/07/22/isms-brave-world/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/case-study/unified-sso-for-industry-conglomerate-to-secure-cloud-and-on-premise-business-applications/</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/case-study/information-security-incident-management-framework-for-large-oil-gas-client/</loc><lastmod>2016-06-29</lastmod></url><url><loc>https://blog.aujas.com/7-reasons-to-include-penetration-testing-for-your-applications</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/2011/04/15/phishers-target-social-media-are-you-the-victim-2/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/2012/09/05/integrate-components-vulnerability-risk-larger-business-risk-grc-tool/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/how-blockchain-can-minimize-iot-security-challenges</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/6-iot-security-worries-that-could-ruin-your-internet-of-things-party</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/10-reasons-your-organization-needs-red-team-testing</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/2010/03/09/security-by-the-wall/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/threat-hunting-to-mitigate-cyber-attacks</loc><lastmod>2021-01-18</lastmod></url><url><loc>https://blog.aujas.com/different-spear-phishing-tactics-and-how-to-prevent-them</loc><lastmod>2020-11-17</lastmod></url><url><loc>https://blog.aujas.com/case-study/it-governance-risk-compliance-framework-implementation-for-a-national-identity-program</loc><lastmod>2016-06-24</lastmod></url><url><loc>https://blog.aujas.com/enabling-application-security-through-effective-program-management</loc><lastmod>2020-10-28</lastmod></url><url><loc>https://blog.aujas.com/consolidating-cybersecurity-practices-to-enable-drive-remote-employee-productivity</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/artificial-intelligence-the-magic-potion-to-bolster-cybersecurity</loc><lastmod>2021-07-28</lastmod></url><url><loc>https://blog.aujas.com/brand-protection-and-real-time-threat-monitoring</loc><lastmod>2024-09-06</lastmod></url><url><loc>https://blog.aujas.com/cloud-native-siem-soar-azure-sentinel</loc><lastmod>2022-01-18</lastmod></url><url><loc>https://blog.aujas.com/xdr-capabilities-to-future-proof-security-operations</loc><lastmod>2022-01-06</lastmod></url><url><loc>https://blog.aujas.com/five-things-to-look-for-in-your-mdr-solution</loc><lastmod>2024-07-11</lastmod></url><url><loc>https://blog.aujas.com/2010/12/20/more-than-password-resets/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/the-roi-of-complying-with-guidelines-for-account-aggregator-ecosystem</loc><lastmod>2023-10-09</lastmod></url><url><loc>https://blog.aujas.com/case-study/secure-code-review-of-internet-of-things-for-a-leading-payment-service-provider-in-apac/</loc><lastmod>2016-10-27</lastmod></url><url><loc>https://blog.aujas.com/2011/11/28/high-performance-sap-security-guard-your-business-not-just-your-sap-erp/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/why-its-time-to-re-think-vulnerability-management-5-indicators-from-data-breach-trends</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/2010/11/22/information-risk-management-part2/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/2016/03/28/30-sec-guide-how-to-save-from-drowning-drown-attack-sslv2-cve-2016-0800/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/soar-playbooks</loc><lastmod>2023-10-27</lastmod></url><url><loc>https://blog.aujas.com/machine-learning-security-operations-center</loc><lastmod>2021-12-17</lastmod></url><url><loc>https://blog.aujas.com/2010/12/07/survey-of-security-pros/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/news/biometric-blessing-curse</loc><lastmod>2018-10-17</lastmod></url><url><loc>https://blog.aujas.com/case-study/solution-design-implementation-for-managing-privileged-ids-in-telecom-environment-2/</loc><lastmod>2016-06-24</lastmod></url><url><loc>https://blog.aujas.com/2010/11/29/mobile-security-j2me/</loc><lastmod>2019-07-22</lastmod></url><url><loc>https://blog.aujas.com/ibmqradar-xdr</loc><lastmod>2022-05-02</lastmod></url><url><loc>https://blog.aujas.com/2011/07/25/consumerization-is-real/</loc><lastmod>2019-07-24</lastmod></url><url><loc>https://blog.aujas.com/2015/02/24/understanding-and-testing-web-services-part-1/</loc><lastmod>2018-04-20</lastmod></url><url><loc>https://blog.aujas.com/zero-trust-cybersecurity-for-financial-services</loc><lastmod>2024-12-07</lastmod></url><url><loc>https://blog.aujas.com/2010/11/15/info-risk-in-mergers/</loc><lastmod>2019-09-10</lastmod></url><url><loc>https://blog.aujas.com</loc><image:image><image:loc>https://www.aujas.com/hubfs/API_Security_!.jpg</image:loc><image:caption>APISecurity</image:caption><image:title>APISecurity</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/The%20Future%20of%20Third-Party%20Risk%20Management_V1.webp</image:loc><image:caption>TheFutureofThirdPartyRiskManagementV1</image:caption><image:title>TheFutureofThirdPartyRiskManagementV1</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/top%20trends.webp</image:loc><image:caption>toptrends</image:caption><image:title>toptrends</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Transforming%20IAM%20(2).webp</image:loc><image:caption>TransformingIAM2</image:caption><image:title>TransformingIAM2</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Navigating%20Regulatory%20Challenges_1.webp</image:loc><image:caption>NavigatingRegulatoryChallenges1</image:caption><image:title>NavigatingRegulatoryChallenges1</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Footer/Footer-Logo.png</image:loc><image:caption>FooterLogo</image:caption><image:title>FooterLogo</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/legacy%20SIEM_Webinar.webp</image:loc><image:caption>legacySIEMWebinar</image:caption><image:title>legacySIEMWebinar</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/From%20Convolution%20to%20Evolution.webp</image:loc><image:caption>FromConvolutiontoEvolution</image:caption><image:title>FromConvolutiontoEvolution</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Debunking%20the%20myth%201.webp</image:loc><image:caption>Debunkingthemyth1</image:caption><image:title>Debunkingthemyth1</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/PALM%20-Smart%20Onboard%20and%20Integration.webp</image:loc><image:caption>PALMSmartOnboardandIntegration</image:caption><image:title>PALMSmartOnboardandIntegration</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Logo-1.webp</image:loc><image:caption>AujasLogo1</image:caption><image:title>AujasLogo1</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Vendor_Breaches.webp</image:loc><image:caption>VendorBreaches</image:caption><image:title>VendorBreaches</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/close.png</image:loc><image:caption>close</image:caption><image:title>close</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/ROI_IAM_BLOG.webp</image:loc><image:caption>ROIIAMBLOG</image:caption><image:title>ROIIAMBLOG</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Cybersecurity%20Logo%202024.webp</image:loc><image:caption>AujasCybersecurityLogo2024</image:caption><image:title>AujasCybersecurityLogo2024</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/API_Security_2.webp</image:loc><image:caption>APISecurity2</image:caption><image:title>APISecurity2</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/blue-search.png</image:loc><image:caption>bluesearch</image:caption><image:title>bluesearch</image:title></image:image><lastmod>2023-12-03</lastmod></url><url><loc>https://blog.aujas.com/casestudy-new</loc><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i6.png</image:loc><image:caption>i6</image:caption><image:title>i6</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/close.png</image:loc><image:caption>close</image:caption><image:title>close</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i4.png</image:loc><image:caption>i4</image:caption><image:title>i4</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Footer/Footer-Logo.png</image:loc><image:caption>FooterLogo</image:caption><image:title>FooterLogo</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i2.png</image:loc><image:caption>i2</image:caption><image:title>i2</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i5.png</image:loc><image:caption>i5</image:caption><image:title>i5</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Logo-1.webp</image:loc><image:caption>AujasLogo1</image:caption><image:title>AujasLogo1</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i1.png</image:loc><image:caption>i1</image:caption><image:title>i1</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202019/Blog/i3.png</image:loc><image:caption>i3</image:caption><image:title>i3</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%202020/blue-search.png</image:loc><image:caption>bluesearch</image:caption><image:title>bluesearch</image:title></image:image><image:image><image:loc>https://www.aujas.com/hubfs/Aujas%20Cybersecurity%20Logo%202024.webp</image:loc><image:caption>AujasCybersecurityLogo2024</image:caption><image:title>AujasCybersecurityLogo2024</image:title></image:image><lastmod>2019-01-10</lastmod></url><url><loc>https://blog.aujas.com/news/analysis-india-post-payment-bank-postmen-as-bankers-a-11470</loc><lastmod>2018-10-01</lastmod></url><url><loc>https://blog.aujas.com/case-study/powering-the-vendor-risk-program-of-a-leading-international-bank/</loc><lastmod>2016-06-29</lastmod></url></urlset>