top of page


Series: New Controls in ISO/IEC 27001:2022 Annex A
Physical Security Monitoring In this article series, we are analyzing the implementation aspects of the 11 new controls of ISO/IEC...
sujosutech
2 days ago2 min read


Series: New Controls in ISO/IEC 27001:2022 Annex A
ICT Readiness for Business Continuity In this article series, we are analyzing the implementation aspects of the 11 new controls of...
sujosutech
4 days ago3 min read


Series: New Controls in ISO/IEC 27001:2022 Annex A
Information Security for Use of Cloud Services The third edition of the popular information security standard ISO/IEC 27001:2022 was...
sujosutech
Jul 23 min read


Series: New Controls in ISO/IEC 27001:2022 Annex A
Threat Intelligence The third edition of the popular information security standard ISO/IEC 27001:2022 was published in February 2022....
sujosutech
Jun 303 min read


The Role of Top Management in ISMS
An Information Security Management System (ISMS) is a structured approach that an organization uses to manage and protect its assets. It...
sujosutech
Jun 114 min read


Using Nmap for Security Auditing
Introduction Nmap (Network Mapper) is a free, open-source tool used primarily for network discovery and security auditing. It is widely...
sujosutech
Jun 64 min read


DPDP Act: Analysing the Rights and Duties of Data Principals
The Digital Personal Data Protection (DPDP) Act was enacted in August 2023. This is India’s privacy law that aims to safeguard personal...
sujosutech
May 303 min read


Application Security: Compliance with ISO/IEC 27001 using ZAP
Introduction ISO/IEC 27001, the international standard for Information Security Management Systems (ISMS), provides a comprehensive...
sujosutech
May 285 min read


Using Wireshark for Vulnerability Assessment
Introduction In the dynamic field of cybersecurity, vulnerability assessment plays a crucial role in proactively identifying system...
sujosutech
May 266 min read


Remote Work: Cyber Security Risks and Mitigation Techniques
Remote work is a work arrangement wherein employees can carry out their job functions from a location other than their office. It is also...
sujosutech
May 194 min read


The rise of AI: A Boon and a Bane for Cybersecurity
The advent of Artificial Intelligence (AI) has given rise to enormous possibilities, as well as challenges, in the domain of...
sujosutech
Apr 294 min read


An exclusive webinar on the Digital Personal Data Protection (DPDP) Act, 2023
An exclusive webinar on the Digital Personal Data Protection (DPDP) Act, 2023, and its draft rules, was conducted on 17th April 2025....
sujosutech
Apr 221 min read


Customer Identity and Access Management (CIAM) Solutions – Implementation of SAP Customer Data Cloud (CDC)
Introduction Customer Identity and Access Management (CIAM) is a specialized branch of identity management focused on external users such...
sujosutech
Apr 115 min read


Privacy Principles and DPDP Act
Privacy principles are fundamental guidelines that organizations and individuals should follow when handling personal information. Some...
sujosutech
Apr 75 min read


Cyber Security and Data Privacy in Australia
Australia has a culture of implementing stringent cyber security measures for safeguarding organizational and national assets. The...
sujosutech
Mar 274 min read


Data Privacy Compliance - Global Standards and Legislations
The availability and large-scale use of sensitive data like personal identifiers, healthcare records, financial data etc., has given rise...
sujosutech
Mar 195 min read


AI and Data Privacy - Addressing Privacy Challenges in AI Systems with Sujosu Technology
The proliferation of Artificial Intelligence (AI) systems has revolutionized industries, but it has also brought significant challenges,...
sujosutech
Jan 242 min read


Nasscom-DSCI Annual Information Security Summit 2024 - Highlights
The Nasscom-DSCI Annual Information Security Summit was held in New Delhi during 4-6 December, 2024. Senior consultants and developers...
sujosutech
Dec 12, 20243 min read


Top Security Threat – Cloud Threats
Most businesses are moving to cloud to cut costs, facilitate business expansion, and benefit from better business continuity and disaster...
sujosutech
Dec 6, 20242 min read


Top Security Threat – IoT Threats
The Internet of Things (IoT) includes several devices that are connected online. These include household appliances (television,...
sujosutech
Dec 4, 20242 min read
bottom of page