Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Posts
  • Information Security
    • Security Information and Event Management (SIEM)
    • Application Security Monitoring
    • Application security for system administrators
    • Embedded Systems Security
    • Software Composition Analysis (SCA): A Deep Dive
    • Application Security Governance
    • Malware: The Malicious Software That Threatens Your Devices
    • Security Engineering
    • In-memory data protection: A critical need in today's world
    • Privilege escalation: What it is and how to prevent it
    • Security Testing
    • API security
    • Vulnerability Assessment
    • Application security for software architects
    • Application Security Architecture
    • Vulnerability Management
    • Database Security: Keeping Your Data Safe
    • Application Security Culture
    • Identity and Access Management (IAM): The Key to Securing Your Organization
    • Password Management: It's Not Just About Remembering Your Passwords
    • Input Validation: The Key to Secure Applications
    • Open Web Application Security Project (OWASP)
    • Application Security Education
    • Application security for beginners
    • Application Firewalls: Your First Line of Defense
    • Grey Box Testing
    • Cloud Security: Protecting Your Data in the Cloud
    • XML Injection: A Dangerous Vulnerability
    • Zero-Day Attacks
    • Mobile Application Security: A Critical Need in Today's World
    • Application security for everyone
    • Network Security Architecture
    • Web Application Firewall (WAF)
    • Web Development Security
    • Application Security Compliance
    • Zero-day exploit prevention
    • Wireless Security Architecture
    • Code Review: A Peer's Eye View
    • Application Security Weaknesses
    • Integration Testing: The Next Step in Software Testing
    • Data Loss Prevention (DLP): Protecting Your Data
    • Security Training
    • Object-oriented programming (OOP) injection: A threat to your code
    • Security Operations Center (SOC)
    • Operating System Security
    • API Security: Protecting Your Data
    • Software Development Life Cycle (SDLC) Security
    • Cloud Application Security
    • Application Security Career
    • Enterprise Application Security
    • Application Security Testing: Protecting Your Apps
    • DevSecOps: The Future of Security
    • Security Policy Development
    • Application security for IT professionals
    • Web Application Security Testing (WAST)
    • Static Application Security Testing (SAST): A Deep Dive
    • Physical Security
    • Denial-of-service (DoS) Prevention
    • Attack Surface Management: Protecting Your Organization from Attack
    • Application security for web developers
    • Application security for testers
    • Application security for executives
    • Fuzz Testing: A Black-Box Testing Technique
    • Code Analysis: Finding and Fixing Security Vulnerabilities
    • Mobile Application Security Testing
    • Denial-of-service (DoS) attacks: A threat to your website
    • Security Auditing
    • Security Automation
    • Security Incident Response
    • Cross-site Scripting (XSS)
    • Phishing: The Art of Deception
    • Application Security Metrics
    • Web Application Security
    • Runtime Application Self-Protection (RASP)
    • Application security for managers
    • System Security
    • Risk Assessment
    • Dynamic Application Security Testing (DAST): A Hands-On Approach
    • Application Security Vulnerability Management
    • Application security for software engineers
    • Ransomware: A growing threat
    • Application security for security professionals
    • Application Security Training
    • Container Security: Keeping Your Applications Safe
    • Security Awareness Training
    • Application Security Awareness
    • Secure Coding Practices
    • Application Security Best Practices
    • Zero Trust Security
    • Threat Modeling
    • Browser Security
    • Side-Channel Attacks: Sneaking a peek at secrets
    • Encryption: The Art of Keeping Secrets
    • Threat Intelligence
    • Application security for developers
    • Wireless Security
Hero Image
Vulnerability Assessment

Vulnerability assessment is the process of identifying and assessing vulnerabilities in an organization’s information systems and assets. It is an important part of any organization’s information security program. Vulnerability assessments can be conducted manually or using automated tools. Manual vulnerability assessments are typically more thorough, but they can be time-consuming and expensive. Automated vulnerability assessments are less thorough, but they can be conducted quickly and easily. The results of a vulnerability assessment can be used to prioritize security efforts, to develop mitigation strategies, and to improve the overall security posture of an organization.

October 1, 2022 Read
Hero Image
Application security for software architects

As a software architect, you play a critical role in the security of your organization’s applications. You are responsible for designing and implementing applications that are secure by design. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

September 24, 2022 Read
Hero Image
Application Security Architecture

Application security architecture is the design of an application with security in mind. It is a critical part of any organization’s security posture, as it can help to protect applications from attack. There are a number of different approaches to application security architecture. One common approach is to use a defense-in-depth model. This model involves layering security controls throughout the application, from the development process to the deployment environment. Another common approach is to use security frameworks.

September 18, 2022 Read
Hero Image
Vulnerability Management

Vulnerability management is the process of identifying, assessing, and mitigating vulnerabilities in an organization’s information systems and assets. It is an ongoing process that is essential for protecting an organization from attack. Vulnerability management typically involves the following steps: Identifying vulnerabilities: The first step is to identify vulnerabilities in an organization’s information systems and assets. This can be done through vulnerability scanning, penetration testing, and threat intelligence gathering. Assessing vulnerabilities: Once vulnerabilities have been identified, they need to be assessed to determine their severity and impact.

September 7, 2022 Read
Hero Image
Database Security: Keeping Your Data Safe

Databases are essential for storing and managing data. They are used by businesses of all sizes to store customer information, financial data, and other sensitive information. However, databases are also a target for attackers. Here are some of the key security challenges associated with databases: Data breaches: Databases can be breached, which can lead to the loss of sensitive data. Data corruption: Databases can be corrupted, which can lead to the loss of data or the inability to access data.

August 30, 2022 Read
Hero Image
Application Security Culture

Application security culture is the set of beliefs and attitudes that an organization has about the importance of security. A strong application security culture is essential for protecting applications from attack and data breaches. There are a number of things that organizations can do to create a strong application security culture. Some of the most important things include: Leadership commitment: Senior leaders must be committed to security and must communicate the importance of security to all employees.

July 29, 2022 Read
Hero Image
Identity and Access Management (IAM): The Key to Securing Your Organization

Identity and access management (IAM) is a critical component of any organization’s security posture. IAM encompasses the processes and technologies used to manage identities and access to resources. By implementing effective IAM, organizations can reduce the risk of unauthorized access to sensitive data and systems. IAM typically includes the following components: Identity governance: This involves managing the lifecycle of identities, including creating, updating, and disabling accounts. Access control: This involves defining who has access to what resources and what actions they can take.

July 22, 2022 Read
Hero Image
Password Management: It's Not Just About Remembering Your Passwords

In today’s digital world, we are constantly bombarded with passwords. We need passwords for our email, our bank accounts, our social media accounts, and more. It can be hard to keep track of all of our passwords, and it can be even harder to create strong passwords that are difficult to guess. That’s where password management comes in. Password management is the process of storing and managing your passwords in a secure way.

July 21, 2022 Read
Hero Image
Input Validation: The Key to Secure Applications

Input validation is the process of checking user input to ensure that it is valid and does not contain any malicious code. It is an essential security measure that can help to prevent a variety of attacks, such as cross-site scripting (XSS) and SQL injection. There are a number of different ways to perform input validation. Some of the most common methods include: Data type validation: This involves checking that the input data is of the correct type.

July 15, 2022 Read
Hero Image
Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a non-profit organization that provides information about web application security. OWASP is a community-driven organization that relies on the contributions of volunteers from all over the world. OWASP has a number of resources available to help developers, security professionals, and organizations improve the security of their web applications. These resources include: OWASP Top 10: The OWASP Top 10 is a list of the most critical web application security risks.

July 13, 2022 Read
Hero Image
Application Security Education

Application security is a critical aspect of any organization’s overall security posture. By educating employees about security risks, organizations can help to prevent them from making mistakes that could lead to data breaches or other security incidents. There are a number of different ways to educate employees about application security. One common approach is to provide training on security best practices. This training can cover topics such as input validation, output encoding, and error handling.

July 8, 2022 Read
Hero Image
Application security for beginners

Application security is the practice of protecting software applications from attack. It is an important part of overall information security, as applications are often the targets of malicious actors. There are a number of different types of application security threats, including: Injection attacks: Injection attacks are a type of attack where an attacker injects malicious code into an application. This malicious code can then be executed by the application, which can lead to data loss, system disruption, or other problems.

July 2, 2022 Read
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo