Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Application security for system administrators

As a system administrator, you play a critical role in the security of your organization’s applications. You are responsible for managing the systems that applications run on and for protecting those systems from attack. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

March 7, 2023 Read
Hero Image
Application security for software architects

As a software architect, you play a critical role in the security of your organization’s applications. You are responsible for designing and implementing applications that are secure by design. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

September 24, 2022 Read
Hero Image
Application security for beginners

Application security is the practice of protecting software applications from attack. It is an important part of overall information security, as applications are often the targets of malicious actors. There are a number of different types of application security threats, including: Injection attacks: Injection attacks are a type of attack where an attacker injects malicious code into an application. This malicious code can then be executed by the application, which can lead to data loss, system disruption, or other problems.

July 2, 2022 Read
Hero Image
Application security for everyone

Applications are everywhere. We use them to shop, bank, work, and communicate. And as applications become more complex, they also become more vulnerable to attack. That’s why application security is important for everyone. Whether you’re a developer, architect, tester, user, or manager, you can play a role in keeping applications secure. Here are a few things you can do to help improve application security: Learn about application security: The first step to improving application security is to learn about it.

February 25, 2022 Read
Hero Image
Application security for IT professionals

Application security is a critical part of any organization’s overall security posture. As an IT professional, it is important to understand the risks of application security and to take steps to mitigate those risks. Here are some of the key risks of application security: Data breaches: Application security vulnerabilities can be exploited by attackers to steal sensitive data, such as customerPII, financial information, or intellectual property. Disruption: Application security vulnerabilities can be exploited by attackers to disrupt business operations, such as by taking down websites or disabling critical applications.

March 2, 2021 Read
Hero Image
Application security for web developers

As a web developer, you play a critical role in the security of your organization’s web applications. You are responsible for writing secure code that protects sensitive data and prevents attackers from exploiting vulnerabilities. Here are some key things to keep in mind when it comes to web application security: Web applications are a target: Web applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

December 12, 2020 Read
Hero Image
Application security for testers

As a tester, you play a critical role in the security of your organization’s applications. You are responsible for finding and fixing vulnerabilities in applications before they are deployed. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

November 29, 2020 Read
Hero Image
Application security for executives

Application security is a critical part of any organization’s overall security posture. As an executive, it is important to understand the risks of application security and to take steps to mitigate those risks. Here are some of the key risks of application security: Data breaches: Application security vulnerabilities can be exploited by attackers to steal sensitive data, such as customerPII, financial information, or intellectual property. Disruption: Application security vulnerabilities can be exploited by attackers to disrupt business operations, such as by taking down websites or disabling critical applications.

November 13, 2020 Read
Hero Image
Application security for managers

As a manager, you are responsible for the security of your organization’s applications. This means ensuring that applications are developed, deployed, and operated securely. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems. Applications are complex: Applications are complex pieces of software.

February 13, 2020 Read
Hero Image
Application security for software engineers

As a software engineer, you play a critical role in the security of your organization’s applications. You are responsible for writing secure code that protects sensitive data and prevents attackers from exploiting vulnerabilities. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

October 11, 2019 Read
Hero Image
Application security for security professionals

Application security is a critical part of any organization’s overall security posture. As a security professional, it is important to understand the risks of application security and to take steps to mitigate those risks. Here are some of the key risks of application security: Data breaches: Application security vulnerabilities can be exploited by attackers to steal sensitive data, such as customerPII, financial information, or intellectual property. Disruption: Application security vulnerabilities can be exploited by attackers to disrupt business operations, such as by taking down websites or disabling critical applications.

September 23, 2019 Read
Hero Image
Application security for developers

Application security is a critical part of any organization’s overall security posture. Developers play a key role in ensuring that applications are secure, and there are a number of things that they can do to help protect applications from attack. Here are some tips for application security for developers: Use secure coding practices: Secure coding practices are a set of guidelines that can be used to write secure code. These guidelines can help to prevent vulnerabilities from being introduced into applications.

January 17, 2019 Read
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo