Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Application Security Career

Application security is a rapidly growing field with a high demand for skilled professionals. If you are interested in a career in application security, there are a number of things you can do to prepare. First, it is important to have a strong understanding of the fundamentals of computer security. This includes topics such as cryptography, network security, and operating system security. You can gain this knowledge by taking courses, reading books, and attending security conferences.

June 8, 2021 Read
Hero Image
Enterprise Application Security

Enterprise applications are a critical part of modern businesses. They process sensitive data, control critical systems, and enable employees to collaborate and share information. As a result, enterprise applications are a major target for attackers. Enterprise application security is the practice of protecting enterprise applications from unauthorized access, modification, or destruction. It is a critical aspect of information security that is essential for protecting the confidentiality, integrity, and availability of enterprise applications.

May 20, 2021 Read
Hero Image
Application Security Testing: Protecting Your Apps

Application security testing (AST) is the process of identifying and mitigating security vulnerabilities in software applications. AST can be performed at any stage of the software development lifecycle (SDLC), from design and development to testing and deployment. There are a number of different AST techniques, including: Static application security testing (SAST): SAST tools analyze the source code of an application to identify potential security vulnerabilities. Dynamic application security testing (DAST): DAST tools interact with an application in its running state to identify potential security vulnerabilities.

May 4, 2021 Read
Hero Image
DevSecOps: The Future of Security

What is DevSecOps? DevSecOps is a security methodology that integrates security into the entire software development lifecycle (SDLC). It is a collaborative approach that brings together developers, security engineers, and operations engineers to build secure software from the start. Why is DevSecOps important? The traditional approach to security is to bolt it on at the end of the SDLC. This approach is ineffective because it is too late to fix security vulnerabilities that are found after the software has been developed and deployed.

April 1, 2021 Read
Hero Image
Security Policy Development

What is a security policy? A security policy is a document that defines the security requirements for an organization. It outlines the organization’s security goals, objectives, and controls. Security policies are designed to protect the organization’s assets, such as data, systems, and employees. Why is security policy development important? Security policy development is important because it helps to ensure that an organization is protected from security threats. Security policies provide a framework for implementing security controls and for managing security risks.

March 9, 2021 Read
Hero Image
Application security for IT professionals

Application security is a critical part of any organization’s overall security posture. As an IT professional, it is important to understand the risks of application security and to take steps to mitigate those risks. Here are some of the key risks of application security: Data breaches: Application security vulnerabilities can be exploited by attackers to steal sensitive data, such as customerPII, financial information, or intellectual property. Disruption: Application security vulnerabilities can be exploited by attackers to disrupt business operations, such as by taking down websites or disabling critical applications.

March 2, 2021 Read
Hero Image
Web Application Security Testing (WAST)

Web application security testing (WAST) is the process of identifying and assessing security vulnerabilities in web applications. It is an important part of any organization’s information security program. WAST can be conducted manually or using automated tools. Manual WAST is typically more thorough, but it can be time-consuming and expensive. Automated WAST is less thorough, but it can be conducted quickly and easily. The results of a WAST can be used to prioritize security efforts, to develop mitigation strategies, and to improve the overall security posture of an organization.

February 14, 2021 Read
Hero Image
Static Application Security Testing (SAST): A Deep Dive

Static application security testing (SAST) is a type of software testing that analyzes source code for potential security vulnerabilities. SAST tools can be used to scan for a wide range of vulnerabilities, including injection attacks, buffer overflows, and SQL injection. SAST is a valuable tool for organizations of all sizes. By identifying and fixing security vulnerabilities early in the development process, SAST can help to prevent attackers from exploiting these vulnerabilities to gain unauthorized access to systems and data.

January 17, 2021 Read
Hero Image
Physical Security

Physical security is the protection of people, property, and physical assets from unauthorized access, damage, or theft. It is a critical aspect of information security that is essential for protecting the confidentiality, integrity, and availability of information. There are a number of threats to physical security, including: Burglary: Burglary is the unlawful entry into a building or other structure with the intent to commit a crime. Theft: Theft is the unlawful taking of another person’s property without their consent.

January 16, 2021 Read
Hero Image
Denial-of-service (DoS) Prevention

A denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Denial-of-service attacks are typically carried out by flooding the target with more requests than it can handle. This can be done by sending large amounts of data to the target, or by sending requests from a large number of different sources. There are a number of different types of DoS attacks, including:

January 14, 2021 Read
Hero Image
Attack Surface Management: Protecting Your Organization from Attack

Attack surface management (ASM) is the process of identifying, assessing, and mitigating the security risks associated with an organization’s attack surface. The attack surface is the sum of all potential ways that an attacker can gain access to an organization’s systems and data. ASM is an important part of any comprehensive security program. By identifying and mitigating security risks, ASM can help to prevent costly data breaches and other security incidents.

January 7, 2021 Read
Hero Image
Application security for web developers

As a web developer, you play a critical role in the security of your organization’s web applications. You are responsible for writing secure code that protects sensitive data and prevents attackers from exploiting vulnerabilities. Here are some key things to keep in mind when it comes to web application security: Web applications are a target: Web applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

December 12, 2020 Read
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo