Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Web Application Security

Web applications are a critical part of our lives. We use them to shop, bank, and communicate with friends and family. But web applications are also a target for attackers. Every day, attackers try to exploit vulnerabilities in web applications to steal data, disrupt services, or cause damage. Web application security is a complex and ever-evolving field. But there are a number of things that organizations can do to protect their web applications from attack.

April 30, 2020 Read
Hero Image
Runtime Application Self-Protection (RASP)

Runtime Application Self-Protection (RASP) is a security technology that helps protect applications from attack while they are running. RASP works by monitoring applications for malicious activity and taking action to prevent attacks from succeeding. RASP can be implemented in a variety of ways, but it typically involves embedding security logic directly into the application code. This allows RASP to monitor and protect applications from within, without the need for additional software or hardware.

March 30, 2020 Read
Hero Image
Application security for managers

As a manager, you are responsible for the security of your organization’s applications. This means ensuring that applications are developed, deployed, and operated securely. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems. Applications are complex: Applications are complex pieces of software.

February 13, 2020 Read
Hero Image
System Security

System security is the process of protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a critical component of any organization’s information security program. There are a variety of different threats to system security, including: Hackers: Hackers are individuals who use their technical skills to gain unauthorized access to computer systems and networks. Viruses: Viruses are malicious software that can be used to damage or steal data from computer systems.

February 11, 2020 Read
Hero Image
Risk Assessment

Risk assessment is the process of identifying, assessing, and mitigating risks. It is a critical part of any organization’s security program. There are a number of steps involved in risk assessment, including: Identifying assets: The first step is to identify the assets that need to be protected. This could include things like data, systems, facilities, and employees. Identifying threats: The next step is to identify the threats that could impact the assets.

January 21, 2020 Read
Hero Image
Dynamic Application Security Testing (DAST): A Hands-On Approach

Dynamic application security testing (DAST) is a type of security testing that scans a web application for vulnerabilities while it is running. DAST tools send simulated attacks to the application and then analyze the application’s responses to identify potential vulnerabilities. DAST is a valuable tool for identifying security vulnerabilities in web applications. However, it is important to note that DAST is not a silver bullet. DAST tools cannot find all vulnerabilities, and they can sometimes generate false positives.

December 27, 2019 Read
Hero Image
Application Security Vulnerability Management

Application security vulnerability management (ASVM) is the process of identifying, assessing, and mitigating security vulnerabilities in applications. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing ASVM, including: Reduced risk of data breaches: By identifying and mitigating security vulnerabilities, organizations can reduce the risk of data breaches. Improved compliance: Organizations that implement ASVM can help to comply with security regulations, such as PCI DSS and HIPAA.

October 26, 2019 Read
Hero Image
Application security for software engineers

As a software engineer, you play a critical role in the security of your organization’s applications. You are responsible for writing secure code that protects sensitive data and prevents attackers from exploiting vulnerabilities. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

October 11, 2019 Read
Hero Image
Ransomware: A growing threat

Ransomware is a type of malware that encrypts a victim’s files and demands a ransom payment in order to decrypt them. Ransomware attacks have been on the rise in recent years, and they can have a devastating impact on businesses and individuals. There are a number of ways that ransomware can be spread. One common method is through phishing emails. In a phishing email, the attacker will send an email that appears to be from a legitimate source, such as a bank or a credit card company.

September 30, 2019 Read
Hero Image
Application security for security professionals

Application security is a critical part of any organization’s overall security posture. As a security professional, it is important to understand the risks of application security and to take steps to mitigate those risks. Here are some of the key risks of application security: Data breaches: Application security vulnerabilities can be exploited by attackers to steal sensitive data, such as customerPII, financial information, or intellectual property. Disruption: Application security vulnerabilities can be exploited by attackers to disrupt business operations, such as by taking down websites or disabling critical applications.

September 23, 2019 Read
Hero Image
Application Security Training

Application security training is the process of teaching developers, testers, and other stakeholders about the security of applications. It is an essential part of any organization’s overall security program. There are a number of benefits to providing application security training, including: Reduced risk of data breaches: By teaching developers and testers about security, organizations can reduce the risk of data breaches. Improved compliance: Organizations that provide application security training can help to comply with security regulations, such as PCI DSS and HIPAA.

September 21, 2019 Read
Hero Image
Container Security: Keeping Your Applications Safe

Containers are a popular way to deploy applications. They offer a number of advantages, such as portability, scalability, and efficiency. However, containers also introduce new security challenges. Here are some of the key security challenges associated with containers: Image vulnerabilities: Containers are built from images, which are essentially snapshots of a filesystem. Images can contain vulnerabilities, which can be exploited by attackers. Runtime vulnerabilities: Containers run on hosts, which are also subject to vulnerabilities.

September 18, 2019 Read
  • ««
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo