Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Application security for testers

As a tester, you play a critical role in the security of your organization’s applications. You are responsible for finding and fixing vulnerabilities in applications before they are deployed. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

November 29, 2020 Read
Hero Image
Application security for executives

Application security is a critical part of any organization’s overall security posture. As an executive, it is important to understand the risks of application security and to take steps to mitigate those risks. Here are some of the key risks of application security: Data breaches: Application security vulnerabilities can be exploited by attackers to steal sensitive data, such as customerPII, financial information, or intellectual property. Disruption: Application security vulnerabilities can be exploited by attackers to disrupt business operations, such as by taking down websites or disabling critical applications.

November 13, 2020 Read
Hero Image
Mobile Application Security Testing

Mobile applications are becoming increasingly popular, as they offer a number of benefits, such as convenience, portability, and flexibility. However, mobile applications also introduce new security challenges. Mobile application security testing is the process of identifying and mitigating security vulnerabilities in mobile applications. It is a critical part of the mobile application development lifecycle, as it can help to prevent security breaches and protect users from malicious attacks. There are a number of different methods that can be used to test mobile application security.

August 2, 2020 Read
Hero Image
Application Security Metrics

Application security metrics are a critical part of any application security program. They help organizations to measure the effectiveness of their security efforts and to identify areas where improvement is needed. There are a number of different application security metrics that can be used. Some of the most common metrics include: Number of vulnerabilities found: This metric measures the number of vulnerabilities that are found in applications. Severity of vulnerabilities: This metric measures the severity of the vulnerabilities that are found.

May 4, 2020 Read
Hero Image
Web Application Security

Web applications are a critical part of our lives. We use them to shop, bank, and communicate with friends and family. But web applications are also a target for attackers. Every day, attackers try to exploit vulnerabilities in web applications to steal data, disrupt services, or cause damage. Web application security is a complex and ever-evolving field. But there are a number of things that organizations can do to protect their web applications from attack.

April 30, 2020 Read
Hero Image
Runtime Application Self-Protection (RASP)

Runtime Application Self-Protection (RASP) is a security technology that helps protect applications from attack while they are running. RASP works by monitoring applications for malicious activity and taking action to prevent attacks from succeeding. RASP can be implemented in a variety of ways, but it typically involves embedding security logic directly into the application code. This allows RASP to monitor and protect applications from within, without the need for additional software or hardware.

March 30, 2020 Read
Hero Image
Application security for managers

As a manager, you are responsible for the security of your organization’s applications. This means ensuring that applications are developed, deployed, and operated securely. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems. Applications are complex: Applications are complex pieces of software.

February 13, 2020 Read
Hero Image
Dynamic Application Security Testing (DAST): A Hands-On Approach

Dynamic application security testing (DAST) is a type of security testing that scans a web application for vulnerabilities while it is running. DAST tools send simulated attacks to the application and then analyze the application’s responses to identify potential vulnerabilities. DAST is a valuable tool for identifying security vulnerabilities in web applications. However, it is important to note that DAST is not a silver bullet. DAST tools cannot find all vulnerabilities, and they can sometimes generate false positives.

December 27, 2019 Read
Hero Image
Application Security Vulnerability Management

Application security vulnerability management (ASVM) is the process of identifying, assessing, and mitigating security vulnerabilities in applications. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing ASVM, including: Reduced risk of data breaches: By identifying and mitigating security vulnerabilities, organizations can reduce the risk of data breaches. Improved compliance: Organizations that implement ASVM can help to comply with security regulations, such as PCI DSS and HIPAA.

October 26, 2019 Read
Hero Image
Application security for software engineers

As a software engineer, you play a critical role in the security of your organization’s applications. You are responsible for writing secure code that protects sensitive data and prevents attackers from exploiting vulnerabilities. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

October 11, 2019 Read
Hero Image
Application security for security professionals

Application security is a critical part of any organization’s overall security posture. As a security professional, it is important to understand the risks of application security and to take steps to mitigate those risks. Here are some of the key risks of application security: Data breaches: Application security vulnerabilities can be exploited by attackers to steal sensitive data, such as customerPII, financial information, or intellectual property. Disruption: Application security vulnerabilities can be exploited by attackers to disrupt business operations, such as by taking down websites or disabling critical applications.

September 23, 2019 Read
Hero Image
Application Security Training

Application security training is the process of teaching developers, testers, and other stakeholders about the security of applications. It is an essential part of any organization’s overall security program. There are a number of benefits to providing application security training, including: Reduced risk of data breaches: By teaching developers and testers about security, organizations can reduce the risk of data breaches. Improved compliance: Organizations that provide application security training can help to comply with security regulations, such as PCI DSS and HIPAA.

September 21, 2019 Read
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo