Talk to Our Experts  

Information Risk Management Blog

Our Top 10 Cyber Security Predictions for 2017

[fa icon="calendar'] Dec 30, 2016 6:16:48 AM / by Anupam Bonanthaya posted in Cybersecurity, Information security, 2017

[fa icon="comment"] 0 Comments

It is that time of the year when you look back at the year that passed by and make predictions for the new year.

We did the same for what we love - Cyber Security, and listed the Top 10 for 2017 in the form of an infographic. Check out if it matches yours?

Read More [fa icon="long-arrow-right"]

10 Basic Things Every Organization MUST-DO for Cybersecurity

[fa icon="calendar'] Aug 26, 2016 2:08:05 AM / by Anupam Bonanthaya posted in Cybersecurity, Cyber Security, Information security, basics of cyber security

[fa icon="comment"] 9 Comments

These days, it is a rarity if there is no news of a high profile cyber attack or breach every week or so. This week was the French Submarine builder DCNS who is building defense submarines for India, Australia, Malaysia and Chile.  Last week was SAGE. The week before was Oracle.

It is a common misconception that only high profile companies in specific industries get attacked. In reality every organization - big or small, across all industries is a target. Or that is what the data says.

The ones who hog the headlines just got lucky.  

We put together a check-list in an infographic format to cover the basics of information security. 10 basic things that every organization must pay attention to in-order to stay away from the headlines when it comes to cybersecurity.

Read More [fa icon="long-arrow-right"]

Managing Information Risk For Digital Age: Why It's Not About Security

[fa icon="calendar'] Jul 20, 2016 11:55:59 PM / by Sameer Shelke posted in Information security, infosec, Gartner, information risk, Digital Security

[fa icon="comment"] 0 Comments

Recently I had the opportunity to interact with industry thought leaders, analysts, practitioners and solution providers during the Gartner Security & Risk Management Summit.

I decided to approach the discussions as a student, with the objective of unlearning and learning. After more than two decades in the information security industry, it was a refreshing change to listen and learn without the "baggage” of pre-existing opinions.

Read More [fa icon="long-arrow-right"]

Why Security Analytics, What are Your Choices, and When?

[fa icon="calendar'] Jul 13, 2016 1:32:09 AM / by Anupam Bonanthaya posted in Information security, SIEM, security analytics, SAVPbyAujas

[fa icon="comment"] 0 Comments

By today i.e. 2016, 1/4th of large global companies are expected to have adopted big data analytics for at-least one security use case! (source: Gartner)

If you belong to the remaining 75% majority OR even if you are in the 25% but got it all wrong the 1st time around - please read-on


Read More [fa icon="long-arrow-right"]

10 Ways CIOs & CISOs Can Beat Talent Crunch in Information Security

[fa icon="calendar'] Jun 15, 2016 2:18:12 AM / by Anupam Bonanthaya posted in Cybersecurity, Information security, Security, talent, SOC, security analytics, security services, hiring, infosec, managed security

[fa icon="comment"] 0 Comments

Information Security has jumped 33% to become Top-3 Priority for IT Executives in 2016. Now with the increasing importance of information security to organizations, the biggest hurdle is no longer buy-in from the board or even the budget $ - It is the "availability of talent" !

Information Security professionals are on the top when it comes to talent crunch. In this article I will cover 10 ways to deal with the talent shortage you are facing today. 

Read More [fa icon="long-arrow-right"]

13 Different Phishing Tactics and 1 Way to Prevent It

[fa icon="calendar'] Apr 20, 2016 1:14:51 AM / by Anupam Bonanthaya posted in Social engineering (security), fail-rate, Cyber Security, hackers, databreach, fall-rate, Information security, Malware, Vulnerability management, Security Trends, ransomware, Security, phishing, hacking, infosec

[fa icon="comment"] 2 Comments


Phishing Attacks are no longer that TOO GOOD TO BELIEVE - you have won a Million $$ jackpot kind of emails from strangers that easily stands out from your otherwise mundane life.

Today, phishing emails have got sophisticated. It is called spear phishing where the attacker tries to "custom-write" the emails to make it believable to you. They try to copy our (normal) life, and that's where it gets interesting and scary at the same time.

23% of recipients now open phishing emails and 11% click on attachments. and nearly 50% of this happens within 60-minutes of the attack !

- 2015 Data Breach Investigations Report (DBIR group)

Let me share a personal experience.

Read More [fa icon="long-arrow-right"]

How can Internet of Things (IoT) Not become a pain-in-the-a$$ from a cyber security perspective?

[fa icon="calendar'] Mar 30, 2016 3:38:06 AM / by Avinash Sinha posted in Privacy, Cybersecurity, IoT, Cyber Security, Internet of Things, Information security, Mobile Security, Security, cyberthreat

[fa icon="comment"] 5 Comments

Internet of Things is as enticing to hackers, as it is to consumers like you and me!

Read More [fa icon="long-arrow-right"]

30-Sec Guide: How to save from DROWNing?

[fa icon="calendar'] Mar 28, 2016 8:35:26 AM / by Naresh T A posted in Cyber Security, DROWN, CVE 2016-0800, Information security, Vulnerability management, Security, CVE

[fa icon="comment"] 0 Comments


Read More [fa icon="long-arrow-right"]

Aujas among the Most-Requested Information Risk / IT Security Firms at 2011 CIO & IT Security Forum

[fa icon="calendar'] Jun 20, 2011 4:49:12 AM / by lfxvideoblog posted in Secure Development, Risk management, Consultants, Social Engineering, Information security, Security, Computer security

[fa icon="comment"] 0 Comments

For Immediate Release

Read More [fa icon="long-arrow-right"]

Data Protection and Controls – Does Format Really Matter?

[fa icon="calendar'] Mar 8, 2011 8:21:35 AM / by lfxvideoblog posted in Risk management, Information security, Data Protection, data security, Data loss, Data Loss Prevention

[fa icon="comment"] 1 Comment

No one can argue that the most valuable asset for any enterprise, regardless of industry (whether military, finance, healthcare) is its Data. Whether that data includes an investment strategy/portfolio, personal identity, healthcare history or national security, it must be safeguarded and controlled.

Read More [fa icon="long-arrow-right"]

Other Popular Posts


Case Studies