Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Posts
  • Information Security
    • Security Information and Event Management (SIEM)
    • Application Security Monitoring
    • Application security for system administrators
    • Embedded Systems Security
    • Software Composition Analysis (SCA): A Deep Dive
    • Application Security Governance
    • Malware: The Malicious Software That Threatens Your Devices
    • Security Engineering
    • In-memory data protection: A critical need in today's world
    • Privilege escalation: What it is and how to prevent it
    • Security Testing
    • API security
    • Vulnerability Assessment
    • Application security for software architects
    • Application Security Architecture
    • Vulnerability Management
    • Database Security: Keeping Your Data Safe
    • Application Security Culture
    • Identity and Access Management (IAM): The Key to Securing Your Organization
    • Password Management: It's Not Just About Remembering Your Passwords
    • Input Validation: The Key to Secure Applications
    • Open Web Application Security Project (OWASP)
    • Application Security Education
    • Application security for beginners
    • Application Firewalls: Your First Line of Defense
    • Grey Box Testing
    • Cloud Security: Protecting Your Data in the Cloud
    • XML Injection: A Dangerous Vulnerability
    • Zero-Day Attacks
    • Mobile Application Security: A Critical Need in Today's World
    • Application security for everyone
    • Network Security Architecture
    • Web Application Firewall (WAF)
    • Web Development Security
    • Application Security Compliance
    • Zero-day exploit prevention
    • Wireless Security Architecture
    • Code Review: A Peer's Eye View
    • Application Security Weaknesses
    • Integration Testing: The Next Step in Software Testing
    • Data Loss Prevention (DLP): Protecting Your Data
    • Security Training
    • Object-oriented programming (OOP) injection: A threat to your code
    • Security Operations Center (SOC)
    • Operating System Security
    • API Security: Protecting Your Data
    • Software Development Life Cycle (SDLC) Security
    • Cloud Application Security
    • Application Security Career
    • Enterprise Application Security
    • Application Security Testing: Protecting Your Apps
    • DevSecOps: The Future of Security
    • Security Policy Development
    • Application security for IT professionals
    • Web Application Security Testing (WAST)
    • Static Application Security Testing (SAST): A Deep Dive
    • Physical Security
    • Denial-of-service (DoS) Prevention
    • Attack Surface Management: Protecting Your Organization from Attack
    • Application security for web developers
    • Application security for testers
    • Application security for executives
    • Fuzz Testing: A Black-Box Testing Technique
    • Code Analysis: Finding and Fixing Security Vulnerabilities
    • Mobile Application Security Testing
    • Denial-of-service (DoS) attacks: A threat to your website
    • Security Auditing
    • Security Automation
    • Security Incident Response
    • Cross-site Scripting (XSS)
    • Phishing: The Art of Deception
    • Application Security Metrics
    • Web Application Security
    • Runtime Application Self-Protection (RASP)
    • Application security for managers
    • System Security
    • Risk Assessment
    • Dynamic Application Security Testing (DAST): A Hands-On Approach
    • Application Security Vulnerability Management
    • Application security for software engineers
    • Ransomware: A growing threat
    • Application security for security professionals
    • Application Security Training
    • Container Security: Keeping Your Applications Safe
    • Security Awareness Training
    • Application Security Awareness
    • Secure Coding Practices
    • Application Security Best Practices
    • Zero Trust Security
    • Threat Modeling
    • Browser Security
    • Side-Channel Attacks: Sneaking a peek at secrets
    • Encryption: The Art of Keeping Secrets
    • Threat Intelligence
    • Application security for developers
    • Wireless Security
Hero Image
Application Firewalls: Your First Line of Defense

Application firewalls (also known as web application firewalls, or WAFs) are a critical component of any organization’s cybersecurity strategy. They help to protect web applications from a wide range of attacks, including cross-site scripting (XSS), SQL injection, and denial-of-service (DoS) attacks. What is an Application Firewall? An application firewall is a type of firewall that monitors and filters traffic to and from web applications. It does this by inspecting the application’s requests and responses, looking for malicious patterns.

June 29, 2022 Read
Hero Image
Grey Box Testing

What is Grey Box Testing? Grey box testing is a type of software testing that combines elements of black box testing and white box testing. In black box testing, the tester has no knowledge of the internal workings of the software being tested. In white box testing, the tester has full knowledge of the internal workings of the software being tested. Grey box testing falls somewhere in between these two extremes.

May 12, 2022 Read
Hero Image
Cloud Security: Protecting Your Data in the Cloud

The cloud is a powerful tool that can help businesses of all sizes save time and money. However, it is important to remember that the cloud is not immune to security threats. In fact, cloud-based data is often more vulnerable to attack than on-premises data. This is because cloud-based data is stored in a shared environment, which makes it a more attractive target for attackers. Additionally, cloud-based data is often accessed over the internet, which makes it more vulnerable to interception.

April 30, 2022 Read
Hero Image
XML Injection: A Dangerous Vulnerability

XML injection is a type of attack that can be used to exploit vulnerabilities in web applications that process XML data. In an XML injection attack, an attacker can insert malicious XML code into an XML document that is sent to a web application. This malicious code can then be executed by the web application, allowing the attacker to gain unauthorized access to the application or its data. XML injection attacks can be used to perform a variety of malicious activities, including:

March 27, 2022 Read
Hero Image
Zero-Day Attacks

Zero-day attacks are a type of cyber attack that exploits a vulnerability in software that is unknown to the software vendor. This means that there is no security patch available to fix the vulnerability, and attackers can exploit it to gain access to systems or steal data. Zero-day attacks are a serious threat to businesses and individuals. They can be used to steal sensitive data, such as credit card numbers or passwords, or to disrupt critical systems.

March 13, 2022 Read
Hero Image
Mobile Application Security: A Critical Need in Today's World

In today’s world, mobile devices are ubiquitous. People use them for everything from staying connected with friends and family to conducting business. As a result, mobile applications are a valuable target for attackers. Mobile applications can be attacked in a variety of ways. Some of the most common attacks include: Data breaches: Attackers can steal sensitive data, such as financial information or personal identification numbers (PINs), from mobile applications. Malware infection: Attackers can install malware on mobile devices, which can then be used to steal data, track users’ activities, or even take control of the device.

March 3, 2022 Read
Hero Image
Application security for everyone

Applications are everywhere. We use them to shop, bank, work, and communicate. And as applications become more complex, they also become more vulnerable to attack. That’s why application security is important for everyone. Whether you’re a developer, architect, tester, user, or manager, you can play a role in keeping applications secure. Here are a few things you can do to help improve application security: Learn about application security: The first step to improving application security is to learn about it.

February 25, 2022 Read
Hero Image
Network Security Architecture

Network security architecture is the design of a network to protect it from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a critical aspect of information security that is essential for protecting the confidentiality, integrity, and availability of data. There are a number of different components that can be included in a network security architecture. Some of the most common components include: Firewalls: Firewalls are devices that filter network traffic and prevent unauthorized access to a network.

February 19, 2022 Read
Hero Image
Web Application Firewall (WAF)

A Web Application Firewall (WAF) is a security device that monitors and filters HTTP traffic between a web application and the internet. WAFs are designed to protect web applications from a variety of attacks, including cross-site scripting (XSS), SQL injection, and denial-of-service (DoS) attacks. WAFs work by inspecting HTTP traffic and identifying patterns that are associated with attacks. When a WAF identifies a suspicious pattern, it can take a variety of actions, such as blocking the traffic, logging the traffic, or rewriting the traffic.

January 18, 2022 Read
Hero Image
Web Development Security

Web development is a complex and ever-evolving field. But there are a number of things that developers can do to help protect their web applications from attack. Here are some of the most important things that developers can do to improve their web application security: Use secure coding practices: There are a number of secure coding practices that developers can follow to help prevent vulnerabilities in their code. These practices include things like input validation, output encoding, and error handling.

January 16, 2022 Read
Hero Image
Application Security Compliance

Application security compliance is the process of ensuring that applications meet the security requirements of applicable regulations and frameworks. There are a number of different regulations and frameworks that organizations need to comply with, depending on their industry and the type of data they handle. Some of the most common regulations include: PCI DSS: The Payment Card Industry Data Security Standard is a set of security requirements for organizations that process credit and debit card payments.

January 7, 2022 Read
Hero Image
Zero-day exploit prevention

A zero-day exploit is a software vulnerability that is unknown to the vendor or developer. This means that there is no patch or update available to fix the vulnerability. Attackers can use zero-day exploits to gain unauthorized access to systems and networks. Zero-day exploits are a serious threat to security. They can be used to steal sensitive data, such as passwords and credit card numbers, or to disrupt critical systems.

January 2, 2022 Read
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo