Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Application Security Monitoring

Application security monitoring is the process of continuously tracking and analyzing applications for security vulnerabilities and threats. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing application security monitoring, including: Early detection: By continuously monitoring applications, organizations can detect security vulnerabilities and threats early, before they can be exploited. Reduced risk of data breaches: By detecting and remediating security vulnerabilities early, organizations can reduce the risk of data breaches.

March 27, 2023 Read
Hero Image
Application security for system administrators

As a system administrator, you play a critical role in the security of your organization’s applications. You are responsible for managing the systems that applications run on and for protecting those systems from attack. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

March 7, 2023 Read
Hero Image
Application Security Governance

Application security governance is the process of establishing and maintaining a set of policies, processes, and controls to ensure the security of applications. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing application security governance, including: Reduced risk of data breaches: By implementing security controls and processes, organizations can reduce the risk of data breaches. Improved compliance: Organizations that implement application security governance can help to comply with security regulations, such as PCI DSS and HIPAA.

January 13, 2023 Read
Hero Image
Application security for software architects

As a software architect, you play a critical role in the security of your organization’s applications. You are responsible for designing and implementing applications that are secure by design. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

September 24, 2022 Read
Hero Image
Application Security Architecture

Application security architecture is the design of an application with security in mind. It is a critical part of any organization’s security posture, as it can help to protect applications from attack. There are a number of different approaches to application security architecture. One common approach is to use a defense-in-depth model. This model involves layering security controls throughout the application, from the development process to the deployment environment. Another common approach is to use security frameworks.

September 18, 2022 Read
Hero Image
Application Security Culture

Application security culture is the set of beliefs and attitudes that an organization has about the importance of security. A strong application security culture is essential for protecting applications from attack and data breaches. There are a number of things that organizations can do to create a strong application security culture. Some of the most important things include: Leadership commitment: Senior leaders must be committed to security and must communicate the importance of security to all employees.

July 29, 2022 Read
Hero Image
Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a non-profit organization that provides information about web application security. OWASP is a community-driven organization that relies on the contributions of volunteers from all over the world. OWASP has a number of resources available to help developers, security professionals, and organizations improve the security of their web applications. These resources include: OWASP Top 10: The OWASP Top 10 is a list of the most critical web application security risks.

July 13, 2022 Read
Hero Image
Application Security Education

Application security is a critical aspect of any organization’s overall security posture. By educating employees about security risks, organizations can help to prevent them from making mistakes that could lead to data breaches or other security incidents. There are a number of different ways to educate employees about application security. One common approach is to provide training on security best practices. This training can cover topics such as input validation, output encoding, and error handling.

July 8, 2022 Read
Hero Image
Application security for beginners

Application security is the practice of protecting software applications from attack. It is an important part of overall information security, as applications are often the targets of malicious actors. There are a number of different types of application security threats, including: Injection attacks: Injection attacks are a type of attack where an attacker injects malicious code into an application. This malicious code can then be executed by the application, which can lead to data loss, system disruption, or other problems.

July 2, 2022 Read
Hero Image
Application Firewalls: Your First Line of Defense

Application firewalls (also known as web application firewalls, or WAFs) are a critical component of any organization’s cybersecurity strategy. They help to protect web applications from a wide range of attacks, including cross-site scripting (XSS), SQL injection, and denial-of-service (DoS) attacks. What is an Application Firewall? An application firewall is a type of firewall that monitors and filters traffic to and from web applications. It does this by inspecting the application’s requests and responses, looking for malicious patterns.

June 29, 2022 Read
Hero Image
Mobile Application Security: A Critical Need in Today's World

In today’s world, mobile devices are ubiquitous. People use them for everything from staying connected with friends and family to conducting business. As a result, mobile applications are a valuable target for attackers. Mobile applications can be attacked in a variety of ways. Some of the most common attacks include: Data breaches: Attackers can steal sensitive data, such as financial information or personal identification numbers (PINs), from mobile applications. Malware infection: Attackers can install malware on mobile devices, which can then be used to steal data, track users’ activities, or even take control of the device.

March 3, 2022 Read
Hero Image
Application security for everyone

Applications are everywhere. We use them to shop, bank, work, and communicate. And as applications become more complex, they also become more vulnerable to attack. That’s why application security is important for everyone. Whether you’re a developer, architect, tester, user, or manager, you can play a role in keeping applications secure. Here are a few things you can do to help improve application security: Learn about application security: The first step to improving application security is to learn about it.

February 25, 2022 Read
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo