Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Posts
  • Information Security
    • Security Information and Event Management (SIEM)
    • Application Security Monitoring
    • Application security for system administrators
    • Embedded Systems Security
    • Software Composition Analysis (SCA): A Deep Dive
    • Application Security Governance
    • Malware: The Malicious Software That Threatens Your Devices
    • Security Engineering
    • In-memory data protection: A critical need in today's world
    • Privilege escalation: What it is and how to prevent it
    • Security Testing
    • API security
    • Vulnerability Assessment
    • Application security for software architects
    • Application Security Architecture
    • Vulnerability Management
    • Database Security: Keeping Your Data Safe
    • Application Security Culture
    • Identity and Access Management (IAM): The Key to Securing Your Organization
    • Password Management: It's Not Just About Remembering Your Passwords
    • Input Validation: The Key to Secure Applications
    • Open Web Application Security Project (OWASP)
    • Application Security Education
    • Application security for beginners
    • Application Firewalls: Your First Line of Defense
    • Grey Box Testing
    • Cloud Security: Protecting Your Data in the Cloud
    • XML Injection: A Dangerous Vulnerability
    • Zero-Day Attacks
    • Mobile Application Security: A Critical Need in Today's World
    • Application security for everyone
    • Network Security Architecture
    • Web Application Firewall (WAF)
    • Web Development Security
    • Application Security Compliance
    • Zero-day exploit prevention
    • Wireless Security Architecture
    • Code Review: A Peer's Eye View
    • Application Security Weaknesses
    • Integration Testing: The Next Step in Software Testing
    • Data Loss Prevention (DLP): Protecting Your Data
    • Security Training
    • Object-oriented programming (OOP) injection: A threat to your code
    • Security Operations Center (SOC)
    • Operating System Security
    • API Security: Protecting Your Data
    • Software Development Life Cycle (SDLC) Security
    • Cloud Application Security
    • Application Security Career
    • Enterprise Application Security
    • Application Security Testing: Protecting Your Apps
    • DevSecOps: The Future of Security
    • Security Policy Development
    • Application security for IT professionals
    • Web Application Security Testing (WAST)
    • Static Application Security Testing (SAST): A Deep Dive
    • Physical Security
    • Denial-of-service (DoS) Prevention
    • Attack Surface Management: Protecting Your Organization from Attack
    • Application security for web developers
    • Application security for testers
    • Application security for executives
    • Fuzz Testing: A Black-Box Testing Technique
    • Code Analysis: Finding and Fixing Security Vulnerabilities
    • Mobile Application Security Testing
    • Denial-of-service (DoS) attacks: A threat to your website
    • Security Auditing
    • Security Automation
    • Security Incident Response
    • Cross-site Scripting (XSS)
    • Phishing: The Art of Deception
    • Application Security Metrics
    • Web Application Security
    • Runtime Application Self-Protection (RASP)
    • Application security for managers
    • System Security
    • Risk Assessment
    • Dynamic Application Security Testing (DAST): A Hands-On Approach
    • Application Security Vulnerability Management
    • Application security for software engineers
    • Ransomware: A growing threat
    • Application security for security professionals
    • Application Security Training
    • Container Security: Keeping Your Applications Safe
    • Security Awareness Training
    • Application Security Awareness
    • Secure Coding Practices
    • Application Security Best Practices
    • Zero Trust Security
    • Threat Modeling
    • Browser Security
    • Side-Channel Attacks: Sneaking a peek at secrets
    • Encryption: The Art of Keeping Secrets
    • Threat Intelligence
    • Application security for developers
    • Wireless Security
Hero Image
Web Application Security

Web applications are a critical part of our lives. We use them to shop, bank, and communicate with friends and family. But web applications are also a target for attackers. Every day, attackers try to exploit vulnerabilities in web applications to steal data, disrupt services, or cause damage. Web application security is a complex and ever-evolving field. But there are a number of things that organizations can do to protect their web applications from attack.

April 30, 2020 Read
Hero Image
Runtime Application Self-Protection (RASP)

Runtime Application Self-Protection (RASP) is a security technology that helps protect applications from attack while they are running. RASP works by monitoring applications for malicious activity and taking action to prevent attacks from succeeding. RASP can be implemented in a variety of ways, but it typically involves embedding security logic directly into the application code. This allows RASP to monitor and protect applications from within, without the need for additional software or hardware.

March 30, 2020 Read
Hero Image
Application security for managers

As a manager, you are responsible for the security of your organization’s applications. This means ensuring that applications are developed, deployed, and operated securely. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems. Applications are complex: Applications are complex pieces of software.

February 13, 2020 Read
Hero Image
System Security

System security is the process of protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a critical component of any organization’s information security program. There are a variety of different threats to system security, including: Hackers: Hackers are individuals who use their technical skills to gain unauthorized access to computer systems and networks. Viruses: Viruses are malicious software that can be used to damage or steal data from computer systems.

February 11, 2020 Read
Hero Image
Risk Assessment

Risk assessment is the process of identifying, assessing, and mitigating risks. It is a critical part of any organization’s security program. There are a number of steps involved in risk assessment, including: Identifying assets: The first step is to identify the assets that need to be protected. This could include things like data, systems, facilities, and employees. Identifying threats: The next step is to identify the threats that could impact the assets.

January 21, 2020 Read
Hero Image
Dynamic Application Security Testing (DAST): A Hands-On Approach

Dynamic application security testing (DAST) is a type of security testing that scans a web application for vulnerabilities while it is running. DAST tools send simulated attacks to the application and then analyze the application’s responses to identify potential vulnerabilities. DAST is a valuable tool for identifying security vulnerabilities in web applications. However, it is important to note that DAST is not a silver bullet. DAST tools cannot find all vulnerabilities, and they can sometimes generate false positives.

December 27, 2019 Read
Hero Image
Application Security Vulnerability Management

Application security vulnerability management (ASVM) is the process of identifying, assessing, and mitigating security vulnerabilities in applications. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing ASVM, including: Reduced risk of data breaches: By identifying and mitigating security vulnerabilities, organizations can reduce the risk of data breaches. Improved compliance: Organizations that implement ASVM can help to comply with security regulations, such as PCI DSS and HIPAA.

October 26, 2019 Read
Hero Image
Application security for software engineers

As a software engineer, you play a critical role in the security of your organization’s applications. You are responsible for writing secure code that protects sensitive data and prevents attackers from exploiting vulnerabilities. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

October 11, 2019 Read
Hero Image
Ransomware: A growing threat

Ransomware is a type of malware that encrypts a victim’s files and demands a ransom payment in order to decrypt them. Ransomware attacks have been on the rise in recent years, and they can have a devastating impact on businesses and individuals. There are a number of ways that ransomware can be spread. One common method is through phishing emails. In a phishing email, the attacker will send an email that appears to be from a legitimate source, such as a bank or a credit card company.

September 30, 2019 Read
Hero Image
Application security for security professionals

Application security is a critical part of any organization’s overall security posture. As a security professional, it is important to understand the risks of application security and to take steps to mitigate those risks. Here are some of the key risks of application security: Data breaches: Application security vulnerabilities can be exploited by attackers to steal sensitive data, such as customerPII, financial information, or intellectual property. Disruption: Application security vulnerabilities can be exploited by attackers to disrupt business operations, such as by taking down websites or disabling critical applications.

September 23, 2019 Read
Hero Image
Application Security Training

Application security training is the process of teaching developers, testers, and other stakeholders about the security of applications. It is an essential part of any organization’s overall security program. There are a number of benefits to providing application security training, including: Reduced risk of data breaches: By teaching developers and testers about security, organizations can reduce the risk of data breaches. Improved compliance: Organizations that provide application security training can help to comply with security regulations, such as PCI DSS and HIPAA.

September 21, 2019 Read
Hero Image
Container Security: Keeping Your Applications Safe

Containers are a popular way to deploy applications. They offer a number of advantages, such as portability, scalability, and efficiency. However, containers also introduce new security challenges. Here are some of the key security challenges associated with containers: Image vulnerabilities: Containers are built from images, which are essentially snapshots of a filesystem. Images can contain vulnerabilities, which can be exploited by attackers. Runtime vulnerabilities: Containers run on hosts, which are also subject to vulnerabilities.

September 18, 2019 Read
  • ««
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo