phishnix.com
Phishnix Resources on Phishing Awareness
http://www.phishnix.com/resource.html
Phishnix for Cloud Services. Phishing is a criminal activity using Social Engineering techniques. Phishers attempt to fraudulently acquire sensitive information by masquerading as a trustworthy person or business in an electronic communication. The sensitive information that is being phished for can range from company credentials, private organizational data, competitive information, to personal information, credit card or financial details etc. What is Spear Phishing? Who is behind Phishnix? Does Phishn...
advantage-marketing.com
Portfolio | Advantage Marketing
http://www.advantage-marketing.com/portfolio.shtml
We help our B2B, professional services and nonprofit clients implement successful marketing campaigns that create buzz and, more importantly, generate leads that turn into customers. Here are some examples of our most recent work. Red Bank, NJ. This well-respected human resources consulting firm came to Advantage Marketing for help building its thought leadership position and increasing the leads generated through its website dgm.com. SEO and keywords, LinkedIn ads, testimonials. Housing Partnership came...
phishnix.com
Automated Anti Phishing Software Tools
http://www.phishnix.com/anti-phishing-software-tools.html
Phishnix for Cloud Services. Phishing is a criminal strategy employing both social engineering and technical deception in order to steal personal, identity and financial data. Social engineering schemes usually use hoax e-mails claiming to be from legitimate businesses and lead recipients to counterfeit websites. These sites are designed to trick individuals into disclosing sensitive data including usernames and passwords. The process would reduce the risk of a genuine, future attack. Aujas Phishnix prov...
phishnix.com
About Us | Phishnix
http://www.phishnix.com/about-us.html
Phishnix for Cloud Services. Phishnix is a Phishing Diagnostic Solution that runs simulated phishing attacks. On employees to assess how they respond to such an attack. Phishnix also provides awareness training as part of the solution, to educate employees so they understand the risks of phishing and how to respond to a phishing attack. Phishnix is powered by Aujas. For more information, email us at. This e-mail address is being protected from spambots. You need JavaScript enabled to view it.
blog.aujas.com
FREAK Vulnerability (CVE-2015-0204)
https://blog.aujas.com/2015/03/18/freak-vulnerability-cve-2015-0204
Information Risk Management Blog. Fa icon="calendar"] Mar 18, 2015 1:33:13 AM / by Atulkumar Gaikwad. TLS and its predecessor SSL are the security protocols designed to securely transmit the data between client and server to prevent eavesdropping and tampering. And the strength of these protocols is in the encryption keys used for communication. In a standard TLS handshake process (as depicted in the flow diagram below), the client and server exchange random numbers and a Pre-Master Secret. Client an...
roninsec.com
Partners - RoninSec
http://www.roninsec.com/about-us/partners
RoninSec - your information security consultant. Social Media Security - incident response for social media. For more details visit http:/ www.aujas.com/.
i-startups.blogspot.com
i-Startups: August 2008
http://i-startups.blogspot.com/2008_08_01_archive.html
Buzz with iNnovation and sTartups. Interview with MS Rao - Founder Aujas Networks - Part 1. On Monday, 25 August 2008. Q: MrRao, are you a first generation entrepreneur in your family? You have obviously enjoyed your entrepreneurial journey, was it difficult? A: Yes and No! Q: A number of our readers are MBA aspirants and are also interested in entrepreneurship. You worked for a start-up after the MBA, any advice for our readers? Q: What’s your take on serial entrepreneurship? And liked my profile. S...
sameersblog.aujas.com
Aujas is now an Amazon Consulting Partner | Sameer Blog
http://sameersblog.aujas.com/aujas-is-now-an-amazon-consulting-partner
Aujas is now an Amazon Consulting Partner. October 31, 2013 10:20 am. When it comes to mitigating information risk, organizations across industry segments now understand the importance of building, releasing and managing software in a secure fashion. Proactive management of security, across the software development lifecycle, is especially critical for those organizations which are either moving applications to the cloud or which offer cloud based services. Aujas’s SDL (Secure Development Lifecycle).
blog.aujas.com
Venom Vulnerablity
https://blog.aujas.com/2015/06/30/venom-vulnerability-cve-2015-3456
Information Risk Management Blog. Fa icon="calendar"] Jun 30, 2015 1:27:48 AM / by Atulkumar Gaikwad. Venom, an acronym for Virtual Environment Neglected Operations Manipulation , is one of the Virtual Machine (VM) Escape. As per the blog. CrowdStrike has published the diagram that elucidates the attack flow -. Though this vulnerability seems to have a devastating impact, there are multiple factors we need to take into account while measuring the likelihood of this vulnerability getting wide spread.
blog.aujas.com
A Glimpse into Mobile Security
https://blog.aujas.com/2015/04/27/a-glimpse-into-mobile-security
Information Risk Management Blog. A Glimpse into Mobile Security. Fa icon="calendar"] Apr 27, 2015 3:34:30 AM / by Tom Thomas. By Milan Singh Thakur. The trend of Smartphone has evolved very drastically over the decade. The Smart devices almost double up each year. Through usage of mobile devices the productivity and the way organizations do business has rapidly evolved. This has given birth to development of millions of Mobile Applications, but how many of these applications are safe? MDM, MAM and MEM.
SOCIAL ENGAGEMENT