Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Security Information and Event Management (SIEM)

Security information and event management (SIEM) is a security solution that collects, aggregates, and analyzes security logs and events from across an organization’s IT infrastructure. SIEM solutions can be used to identify threats, investigate security incidents, and improve overall security posture. SIEM solutions typically collect data from a variety of sources, including: Network devices, such as firewalls and switches Security devices, such as intrusion detection systems (IDS) and intrusion prevention systems (IPS) Servers Endpoint devices, such as laptops and desktops Applications Once data is collected, SIEM solutions aggregate it and analyze it for suspicious activity.

April 3, 2023 Read
Hero Image
Application Security Monitoring

Application security monitoring is the process of continuously tracking and analyzing applications for security vulnerabilities and threats. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing application security monitoring, including: Early detection: By continuously monitoring applications, organizations can detect security vulnerabilities and threats early, before they can be exploited. Reduced risk of data breaches: By detecting and remediating security vulnerabilities early, organizations can reduce the risk of data breaches.

March 27, 2023 Read
Hero Image
Application security for system administrators

As a system administrator, you play a critical role in the security of your organization’s applications. You are responsible for managing the systems that applications run on and for protecting those systems from attack. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

March 7, 2023 Read
Hero Image
Embedded Systems Security

Embedded systems are everywhere. They control our cars, our homes, and our businesses. They are also increasingly connected to the internet, which makes them vulnerable to attack. Embedded systems security is the practice of protecting embedded systems from unauthorized access, modification, or destruction. It is a critical aspect of information security that is essential for protecting the confidentiality, integrity, and availability of embedded systems. There are a number of threats to embedded systems security, including:

February 8, 2023 Read
Hero Image
Software Composition Analysis (SCA): A Deep Dive

Software Composition Analysis (SCA) is a process for identifying and assessing security vulnerabilities in the open source components used to build software applications. SCA can be used to identify vulnerabilities in both third-party and in-house developed components. SCA is a critical tool for protecting software applications from security vulnerabilities. By identifying and addressing vulnerabilities in open source components, SCA can help to prevent attackers from exploiting these vulnerabilities to gain unauthorized access to applications and systems.

January 20, 2023 Read
Hero Image
Application Security Governance

Application security governance is the process of establishing and maintaining a set of policies, processes, and controls to ensure the security of applications. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing application security governance, including: Reduced risk of data breaches: By implementing security controls and processes, organizations can reduce the risk of data breaches. Improved compliance: Organizations that implement application security governance can help to comply with security regulations, such as PCI DSS and HIPAA.

January 13, 2023 Read
Hero Image
Malware: The Malicious Software That Threatens Your Devices

Malware is a broad term that refers to any malicious software that can damage or disable computers, steal data, or gain unauthorized access to systems. Malware can be delivered in a variety of ways, including email attachments, malicious websites, and USB drives. There are many different types of malware, but some of the most common include: Viruses: Viruses are self-replicating programs that can spread from one computer to another. They can damage files, steal data, or even take control of a computer.

December 13, 2022 Read
Hero Image
Security Engineering

Security engineering is the application of engineering principles to the design, development, and operation of secure systems. It is a broad field that encompasses a wide range of topics, including: Security architecture: The design of secure systems and networks. Security analysis: The identification and assessment of security risks. Security testing: The evaluation of security controls to ensure that they are effective. Security assurance: The process of providing confidence that a system is secure.

December 6, 2022 Read
Hero Image
In-memory data protection: A critical need in today's world

In today’s world, data is more valuable than ever before. Businesses rely on data to make decisions, to provide services, and to compete. As a result, it is essential to protect data from unauthorized access, use, or disclosure. One of the most critical times for data protection is when it is in memory. This is because data in memory is often unencrypted and therefore vulnerable to attack. In-memory data protection solutions can help to protect data from unauthorized access, use, or disclosure.

December 2, 2022 Read
Hero Image
Privilege escalation: What it is and how to prevent it

In the world of cybersecurity, privilege escalation is a serious threat. It occurs when an attacker gains unauthorized access to a system or application with elevated privileges. This can allow the attacker to do things like steal data, delete files, or even take control of the system. There are a number of ways that privilege escalation can be carried out. Some of the most common methods include: Exploiting software vulnerabilities: Attackers can exploit software vulnerabilities to gain unauthorized access to systems or applications.

November 29, 2022 Read
Hero Image
Security Testing

Security testing is a systematic process of evaluating an information system or product for vulnerabilities that could be exploited by attackers. It is an important part of any organization’s security program, as it can help to identify and fix security flaws before they can be exploited. There are a variety of different security testing methods that can be used, depending on the specific needs of the organization. Some of the most common methods include:

November 15, 2022 Read
Hero Image
API security

What is API Security? API security is the practice of protecting APIs from unauthorized access, use, modification, or disclosure. APIs are a critical part of modern software development, and they are increasingly being used to expose sensitive data and functionality. As a result, API security is a critical concern for organizations of all sizes. API Security Threats There are a number of threats that can impact API security, including: Unauthorized access: This is the most common type of API attack.

October 13, 2022 Read
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo