top of page


Series: New Controls in ISO/IEC 27001:2022 Annex A
Configuration Management In this article series, we are analyzing the implementation aspects of the 11 new controls of ISO/IEC...
sujosutech
Jul 143 min read


Series: New Controls in ISO/IEC 27001:2022 Annex A
Physical Security Monitoring In this article series, we are analyzing the implementation aspects of the 11 new controls of ISO/IEC...
sujosutech
Jul 102 min read


Series: New Controls in ISO/IEC 27001:2022 Annex A
ICT Readiness for Business Continuity In this article series, we are analyzing the implementation aspects of the 11 new controls of...
sujosutech
Jul 83 min read


Series: New Controls in ISO/IEC 27001:2022 Annex A
Information Security for Use of Cloud Services The third edition of the popular information security standard ISO/IEC 27001:2022 was...
sujosutech
Jul 23 min read


Series: New Controls in ISO/IEC 27001:2022 Annex A
Threat Intelligence The third edition of the popular information security standard ISO/IEC 27001:2022 was published in February 2022....
sujosutech
Jun 303 min read


The Role of Top Management in ISMS
An Information Security Management System (ISMS) is a structured approach that an organization uses to manage and protect its assets. It...
sujosutech
Jun 114 min read


Using Nmap for Security Auditing
Introduction Nmap (Network Mapper) is a free, open-source tool used primarily for network discovery and security auditing. It is widely...
sujosutech
Jun 64 min read


Future-Proofing Enterprise Portals: Sujosu Technology Leads LTS Upgrade for a Fortune 500 Utility Company
Upgrading enterprise applications to Long-Term Support (LTS) frameworks is essential for performance, stability, and security. Sujosu...
sujosutech
Jun 42 min read


DPDP Act: Analysing the Rights and Duties of Data Principals
The Digital Personal Data Protection (DPDP) Act was enacted in August 2023. This is India’s privacy law that aims to safeguard personal...
sujosutech
May 303 min read


Application Security: Compliance with ISO/IEC 27001 using ZAP
Introduction ISO/IEC 27001, the international standard for Information Security Management Systems (ISMS), provides a comprehensive...
sujosutech
May 285 min read


Using Wireshark for Vulnerability Assessment
Introduction In the dynamic field of cybersecurity, vulnerability assessment plays a crucial role in proactively identifying system...
sujosutech
May 266 min read


Remote Work: Cyber Security Risks and Mitigation Techniques
Remote work is a work arrangement wherein employees can carry out their job functions from a location other than their office. It is also...
sujosutech
May 194 min read


Designing a Multi-Method Authentication Architecture: Combining OAuth, SAML, and Traditional Login for Secure, Scalable Access Control
Introduction In today’s fast-evolving digital landscape, user authentication isn’t just about verifying credentials—it’s about enabling...
sujosutech
May 154 min read


From Legacy SharePoint to Power Apps: How We Enabled a Low-Code Digital Transformation
In today’s fast-paced business environment, relying on outdated custom applications can hold organizations back—especially when those...
sujosutech
May 123 min read


GeoServer in Action: Powering Real-Time Geospatial Applications with Open Standards
Modern enterprises are dealing with more spatial data than ever before—whether it’s satellite imagery, urban infrastructure maps, or...
sujosutech
May 74 min read


Power BI and SharePoint Online Integration: Turning Document Libraries into Real-Time Dashboards
In today’s data-first workplace, collaboration tools and analytics platforms must work hand in hand. That’s where SharePoint Online and...
sujosutech
May 53 min read


AI-Powered Web Scraping: Transforming Data Extraction for Businesses
Web scraping has long been a critical tool for businesses, researchers, and analysts, enabling automated extraction of valuable data from...
sujosutech
May 23 min read


Artificial General Intelligence: How Close Are We to Human-Level AI?
Artificial Intelligence (AI) has become an integral part of our daily lives, powering applications from virtual assistants to...
sujosutech
Apr 304 min read


The rise of AI: A Boon and a Bane for Cybersecurity
The advent of Artificial Intelligence (AI) has given rise to enormous possibilities, as well as challenges, in the domain of...
sujosutech
Apr 294 min read


Unveiling GeoAcquire’s GIS Feature: A Smarter Way to Manage Land Acquisition
Land acquisition is central to infrastructure development, renewable energy projects, and public works—but the process is often complex,...
sujosutech
Apr 283 min read
bottom of page