Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Web Development Security

Web development is a complex and ever-evolving field. But there are a number of things that developers can do to help protect their web applications from attack. Here are some of the most important things that developers can do to improve their web application security: Use secure coding practices: There are a number of secure coding practices that developers can follow to help prevent vulnerabilities in their code. These practices include things like input validation, output encoding, and error handling.

January 16, 2022 Read
Hero Image
Software Development Life Cycle (SDLC) Security

What is SDLC security? SDLC security is the process of integrating security into the software development life cycle (SDLC). It is a critical component of any organization’s security program, as it can help to reduce the risk of security vulnerabilities being introduced into software. Why is SDLC security important? SDLC security is important because it helps to ensure that security is considered throughout the software development process. This can help to reduce the risk of security vulnerabilities being introduced into software, which can lead to data breaches, system outages, and other security incidents.

August 13, 2021 Read
Hero Image
Security Policy Development

What is a security policy? A security policy is a document that defines the security requirements for an organization. It outlines the organization’s security goals, objectives, and controls. Security policies are designed to protect the organization’s assets, such as data, systems, and employees. Why is security policy development important? Security policy development is important because it helps to ensure that an organization is protected from security threats. Security policies provide a framework for implementing security controls and for managing security risks.

March 9, 2021 Read
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo