Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Posts
  • Information Security
    • Security Information and Event Management (SIEM)
    • Application Security Monitoring
    • Application security for system administrators
    • Embedded Systems Security
    • Software Composition Analysis (SCA): A Deep Dive
    • Application Security Governance
    • Malware: The Malicious Software That Threatens Your Devices
    • Security Engineering
    • In-memory data protection: A critical need in today's world
    • Privilege escalation: What it is and how to prevent it
    • Security Testing
    • API security
    • Vulnerability Assessment
    • Application security for software architects
    • Application Security Architecture
    • Vulnerability Management
    • Database Security: Keeping Your Data Safe
    • Application Security Culture
    • Identity and Access Management (IAM): The Key to Securing Your Organization
    • Password Management: It's Not Just About Remembering Your Passwords
    • Input Validation: The Key to Secure Applications
    • Open Web Application Security Project (OWASP)
    • Application Security Education
    • Application security for beginners
    • Application Firewalls: Your First Line of Defense
    • Grey Box Testing
    • Cloud Security: Protecting Your Data in the Cloud
    • XML Injection: A Dangerous Vulnerability
    • Zero-Day Attacks
    • Mobile Application Security: A Critical Need in Today's World
    • Application security for everyone
    • Network Security Architecture
    • Web Application Firewall (WAF)
    • Web Development Security
    • Application Security Compliance
    • Zero-day exploit prevention
    • Wireless Security Architecture
    • Code Review: A Peer's Eye View
    • Application Security Weaknesses
    • Integration Testing: The Next Step in Software Testing
    • Data Loss Prevention (DLP): Protecting Your Data
    • Security Training
    • Object-oriented programming (OOP) injection: A threat to your code
    • Security Operations Center (SOC)
    • Operating System Security
    • API Security: Protecting Your Data
    • Software Development Life Cycle (SDLC) Security
    • Cloud Application Security
    • Application Security Career
    • Enterprise Application Security
    • Application Security Testing: Protecting Your Apps
    • DevSecOps: The Future of Security
    • Security Policy Development
    • Application security for IT professionals
    • Web Application Security Testing (WAST)
    • Static Application Security Testing (SAST): A Deep Dive
    • Physical Security
    • Denial-of-service (DoS) Prevention
    • Attack Surface Management: Protecting Your Organization from Attack
    • Application security for web developers
    • Application security for testers
    • Application security for executives
    • Fuzz Testing: A Black-Box Testing Technique
    • Code Analysis: Finding and Fixing Security Vulnerabilities
    • Mobile Application Security Testing
    • Denial-of-service (DoS) attacks: A threat to your website
    • Security Auditing
    • Security Automation
    • Security Incident Response
    • Cross-site Scripting (XSS)
    • Phishing: The Art of Deception
    • Application Security Metrics
    • Web Application Security
    • Runtime Application Self-Protection (RASP)
    • Application security for managers
    • System Security
    • Risk Assessment
    • Dynamic Application Security Testing (DAST): A Hands-On Approach
    • Application Security Vulnerability Management
    • Application security for software engineers
    • Ransomware: A growing threat
    • Application security for security professionals
    • Application Security Training
    • Container Security: Keeping Your Applications Safe
    • Security Awareness Training
    • Application Security Awareness
    • Secure Coding Practices
    • Application Security Best Practices
    • Zero Trust Security
    • Threat Modeling
    • Browser Security
    • Side-Channel Attacks: Sneaking a peek at secrets
    • Encryption: The Art of Keeping Secrets
    • Threat Intelligence
    • Application security for developers
    • Wireless Security
Hero Image
Security Information and Event Management (SIEM)

Security information and event management (SIEM) is a security solution that collects, aggregates, and analyzes security logs and events from across an organization’s IT infrastructure. SIEM solutions can be used to identify threats, investigate security incidents, and improve overall security posture. SIEM solutions typically collect data from a variety of sources, including: Network devices, such as firewalls and switches Security devices, such as intrusion detection systems (IDS) and intrusion prevention systems (IPS) Servers Endpoint devices, such as laptops and desktops Applications Once data is collected, SIEM solutions aggregate it and analyze it for suspicious activity.

April 3, 2023 Read
Hero Image
Application Security Monitoring

Application security monitoring is the process of continuously tracking and analyzing applications for security vulnerabilities and threats. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing application security monitoring, including: Early detection: By continuously monitoring applications, organizations can detect security vulnerabilities and threats early, before they can be exploited. Reduced risk of data breaches: By detecting and remediating security vulnerabilities early, organizations can reduce the risk of data breaches.

March 27, 2023 Read
Hero Image
Application security for system administrators

As a system administrator, you play a critical role in the security of your organization’s applications. You are responsible for managing the systems that applications run on and for protecting those systems from attack. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

March 7, 2023 Read
Hero Image
Embedded Systems Security

Embedded systems are everywhere. They control our cars, our homes, and our businesses. They are also increasingly connected to the internet, which makes them vulnerable to attack. Embedded systems security is the practice of protecting embedded systems from unauthorized access, modification, or destruction. It is a critical aspect of information security that is essential for protecting the confidentiality, integrity, and availability of embedded systems. There are a number of threats to embedded systems security, including:

February 8, 2023 Read
Hero Image
Software Composition Analysis (SCA): A Deep Dive

Software Composition Analysis (SCA) is a process for identifying and assessing security vulnerabilities in the open source components used to build software applications. SCA can be used to identify vulnerabilities in both third-party and in-house developed components. SCA is a critical tool for protecting software applications from security vulnerabilities. By identifying and addressing vulnerabilities in open source components, SCA can help to prevent attackers from exploiting these vulnerabilities to gain unauthorized access to applications and systems.

January 20, 2023 Read
Hero Image
Application Security Governance

Application security governance is the process of establishing and maintaining a set of policies, processes, and controls to ensure the security of applications. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing application security governance, including: Reduced risk of data breaches: By implementing security controls and processes, organizations can reduce the risk of data breaches. Improved compliance: Organizations that implement application security governance can help to comply with security regulations, such as PCI DSS and HIPAA.

January 13, 2023 Read
Hero Image
Malware: The Malicious Software That Threatens Your Devices

Malware is a broad term that refers to any malicious software that can damage or disable computers, steal data, or gain unauthorized access to systems. Malware can be delivered in a variety of ways, including email attachments, malicious websites, and USB drives. There are many different types of malware, but some of the most common include: Viruses: Viruses are self-replicating programs that can spread from one computer to another. They can damage files, steal data, or even take control of a computer.

December 13, 2022 Read
Hero Image
Security Engineering

Security engineering is the application of engineering principles to the design, development, and operation of secure systems. It is a broad field that encompasses a wide range of topics, including: Security architecture: The design of secure systems and networks. Security analysis: The identification and assessment of security risks. Security testing: The evaluation of security controls to ensure that they are effective. Security assurance: The process of providing confidence that a system is secure.

December 6, 2022 Read
Hero Image
In-memory data protection: A critical need in today's world

In today’s world, data is more valuable than ever before. Businesses rely on data to make decisions, to provide services, and to compete. As a result, it is essential to protect data from unauthorized access, use, or disclosure. One of the most critical times for data protection is when it is in memory. This is because data in memory is often unencrypted and therefore vulnerable to attack. In-memory data protection solutions can help to protect data from unauthorized access, use, or disclosure.

December 2, 2022 Read
Hero Image
Privilege escalation: What it is and how to prevent it

In the world of cybersecurity, privilege escalation is a serious threat. It occurs when an attacker gains unauthorized access to a system or application with elevated privileges. This can allow the attacker to do things like steal data, delete files, or even take control of the system. There are a number of ways that privilege escalation can be carried out. Some of the most common methods include: Exploiting software vulnerabilities: Attackers can exploit software vulnerabilities to gain unauthorized access to systems or applications.

November 29, 2022 Read
Hero Image
Security Testing

Security testing is a systematic process of evaluating an information system or product for vulnerabilities that could be exploited by attackers. It is an important part of any organization’s security program, as it can help to identify and fix security flaws before they can be exploited. There are a variety of different security testing methods that can be used, depending on the specific needs of the organization. Some of the most common methods include:

November 15, 2022 Read
Hero Image
API security

What is API Security? API security is the practice of protecting APIs from unauthorized access, use, modification, or disclosure. APIs are a critical part of modern software development, and they are increasingly being used to expose sensitive data and functionality. As a result, API security is a critical concern for organizations of all sizes. API Security Threats There are a number of threats that can impact API security, including: Unauthorized access: This is the most common type of API attack.

October 13, 2022 Read
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo