Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Posts
  • Information Security
    • Security Information and Event Management (SIEM)
    • Application Security Monitoring
    • Application security for system administrators
    • Embedded Systems Security
    • Software Composition Analysis (SCA): A Deep Dive
    • Application Security Governance
    • Malware: The Malicious Software That Threatens Your Devices
    • Security Engineering
    • In-memory data protection: A critical need in today's world
    • Privilege escalation: What it is and how to prevent it
    • Security Testing
    • API security
    • Vulnerability Assessment
    • Application security for software architects
    • Application Security Architecture
    • Vulnerability Management
    • Database Security: Keeping Your Data Safe
    • Application Security Culture
    • Identity and Access Management (IAM): The Key to Securing Your Organization
    • Password Management: It's Not Just About Remembering Your Passwords
    • Input Validation: The Key to Secure Applications
    • Open Web Application Security Project (OWASP)
    • Application Security Education
    • Application security for beginners
    • Application Firewalls: Your First Line of Defense
    • Grey Box Testing
    • Cloud Security: Protecting Your Data in the Cloud
    • XML Injection: A Dangerous Vulnerability
    • Zero-Day Attacks
    • Mobile Application Security: A Critical Need in Today's World
    • Application security for everyone
    • Network Security Architecture
    • Web Application Firewall (WAF)
    • Web Development Security
    • Application Security Compliance
    • Zero-day exploit prevention
    • Wireless Security Architecture
    • Code Review: A Peer's Eye View
    • Application Security Weaknesses
    • Integration Testing: The Next Step in Software Testing
    • Data Loss Prevention (DLP): Protecting Your Data
    • Security Training
    • Object-oriented programming (OOP) injection: A threat to your code
    • Security Operations Center (SOC)
    • Operating System Security
    • API Security: Protecting Your Data
    • Software Development Life Cycle (SDLC) Security
    • Cloud Application Security
    • Application Security Career
    • Enterprise Application Security
    • Application Security Testing: Protecting Your Apps
    • DevSecOps: The Future of Security
    • Security Policy Development
    • Application security for IT professionals
    • Web Application Security Testing (WAST)
    • Static Application Security Testing (SAST): A Deep Dive
    • Physical Security
    • Denial-of-service (DoS) Prevention
    • Attack Surface Management: Protecting Your Organization from Attack
    • Application security for web developers
    • Application security for testers
    • Application security for executives
    • Fuzz Testing: A Black-Box Testing Technique
    • Code Analysis: Finding and Fixing Security Vulnerabilities
    • Mobile Application Security Testing
    • Denial-of-service (DoS) attacks: A threat to your website
    • Security Auditing
    • Security Automation
    • Security Incident Response
    • Cross-site Scripting (XSS)
    • Phishing: The Art of Deception
    • Application Security Metrics
    • Web Application Security
    • Runtime Application Self-Protection (RASP)
    • Application security for managers
    • System Security
    • Risk Assessment
    • Dynamic Application Security Testing (DAST): A Hands-On Approach
    • Application Security Vulnerability Management
    • Application security for software engineers
    • Ransomware: A growing threat
    • Application security for security professionals
    • Application Security Training
    • Container Security: Keeping Your Applications Safe
    • Security Awareness Training
    • Application Security Awareness
    • Secure Coding Practices
    • Application Security Best Practices
    • Zero Trust Security
    • Threat Modeling
    • Browser Security
    • Side-Channel Attacks: Sneaking a peek at secrets
    • Encryption: The Art of Keeping Secrets
    • Threat Intelligence
    • Application security for developers
    • Wireless Security
Hero Image
Wireless Security Architecture

Wireless networks are becoming increasingly ubiquitous, as more and more devices are connecting to the internet wirelessly. This trend is being driven by the growing popularity of mobile devices, such as smartphones and tablets. As wireless networks become more popular, they also become more attractive targets for attackers. This is because wireless networks are often easier to attack than wired networks. There are a number of security risks associated with wireless networks.

December 26, 2021 Read
Hero Image
Code Review: A Peer's Eye View

Code review is a process where one or more developers inspect another developer’s code to find potential errors, security vulnerabilities, and other defects. It is an important part of any software development process, as it can help to improve the quality of the code and prevent defects from reaching production. There are two main types of code reviews: formal and informal. Formal code reviews are typically conducted by a team of developers, while informal code reviews can be conducted by a single developer or a small group of developers.

November 3, 2021 Read
Hero Image
Application Security Weaknesses

Application security weaknesses are vulnerabilities in applications that can be exploited by attackers to gain unauthorized access to systems or data. There are a number of different types of application security weaknesses, including: Injection flaws: Injection flaws occur when unvalidated or malicious data is injected into an application. This can lead to attackers executing arbitrary code on the system or gaining unauthorized access to data. Broken authentication and session management: Broken authentication and session management weaknesses occur when applications do not properly authenticate users or manage sessions.

October 27, 2021 Read
Hero Image
Integration Testing: The Next Step in Software Testing

Integration testing is a type of software testing that is conducted to verify the interfaces and interactions between software modules. It is the next step in software testing, after unit testing. The goal of integration testing is to ensure that the different modules of a software system work together correctly. This is done by testing the interfaces between the modules, as well as the interactions between the modules. Integration testing can be conducted using a variety of methods, including:

October 6, 2021 Read
Hero Image
Data Loss Prevention (DLP): Protecting Your Data

Data loss prevention (DLP) is a set of processes, procedures, and technologies designed to prevent the unauthorized access, use, disclosure, disruption, modification, or destruction of data. DLP is an important part of any comprehensive security program. There are a number of different DLP techniques, including: Data classification: Data is classified according to its sensitivity. This helps to identify which data needs to be protected. Data discovery: Data is discovered and inventoryed.

September 20, 2021 Read
Hero Image
Security Training

What is security training? Security training is the process of educating employees about security risks and how to protect themselves and the organization from those risks. It is an important part of any organization’s security program, as it can help to reduce the risk of security incidents. Why is security training important? Security training is important because it helps to ensure that employees are aware of the security risks that they face and how to protect themselves from those risks.

September 2, 2021 Read
Hero Image
Object-oriented programming (OOP) injection: A threat to your code

In object-oriented programming (OOP), classes are used to represent real-world objects. Classes have attributes, which represent the properties of an object, and methods, which represent the actions that an object can perform. OOP injection is a type of code injection attack that takes advantage of the way that classes are defined in OOP languages. In an OOP injection attack, an attacker injects malicious code into a class definition. This malicious code can then be executed when the class is instantiated.

August 31, 2021 Read
Hero Image
Security Operations Center (SOC)

A Security Operations Center (SOC) is a team of security professionals who are responsible for monitoring, detecting, and responding to security incidents. SOCs are typically staffed 24/7 to ensure that they can respond to incidents quickly and effectively. SOCs use a variety of tools and technologies to monitor for security incidents. These tools can include: Security information and event management (SIEM) systems: SIEM systems collect and analyze security logs from across an organization’s network.

August 17, 2021 Read
Hero Image
Operating System Security

Operating systems (OS) are the foundation of all computing devices. They provide the basic services that allow us to run applications, access files, and connect to networks. As such, OS security is critical to the overall security of our devices and data. There are a number of threats to OS security, including: Malware: Malware, such as viruses, worms, and Trojan horses, can be used to steal data, damage systems, or disrupt operations.

August 15, 2021 Read
Hero Image
Software Development Life Cycle (SDLC) Security

What is SDLC security? SDLC security is the process of integrating security into the software development life cycle (SDLC). It is a critical component of any organization’s security program, as it can help to reduce the risk of security vulnerabilities being introduced into software. Why is SDLC security important? SDLC security is important because it helps to ensure that security is considered throughout the software development process. This can help to reduce the risk of security vulnerabilities being introduced into software, which can lead to data breaches, system outages, and other security incidents.

August 13, 2021 Read
Hero Image
API Security: Protecting Your Data

Application programming interfaces (APIs) are everywhere. They’re used to power everything from mobile apps to cloud-based services. And as APIs become more and more ubiquitous, so too does the risk of API security breaches. In fact, a recent study by the Ponemon Institute found that the average cost of a data breach involving APIs is now over $4 million. That’s a significant increase from just a few years ago, and it’s a trend that’s only going to continue in the future.

August 13, 2021 Read
Hero Image
Cloud Application Security

Cloud applications are becoming increasingly popular, as they offer a number of benefits, such as scalability, flexibility, and cost-effectiveness. However, cloud applications also introduce new security challenges. There are a number of different threats to cloud application security, including: Data breaches: Data breaches are a major concern for cloud applications. This is because cloud applications often store sensitive data, such as financial information and personal information. Malware attacks: Malware attacks are another major concern for cloud applications.

June 13, 2021 Read
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo