Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Security Information and Event Management (SIEM)

Security information and event management (SIEM) is a security solution that collects, aggregates, and analyzes security logs and events from across an organization’s IT infrastructure. SIEM solutions can be used to identify threats, investigate security incidents, and improve overall security posture. SIEM solutions typically collect data from a variety of sources, including: Network devices, such as firewalls and switches Security devices, such as intrusion detection systems (IDS) and intrusion prevention systems (IPS) Servers Endpoint devices, such as laptops and desktops Applications Once data is collected, SIEM solutions aggregate it and analyze it for suspicious activity.

April 3, 2023 Read
Hero Image
Vulnerability Management

Vulnerability management is the process of identifying, assessing, and mitigating vulnerabilities in an organization’s information systems and assets. It is an ongoing process that is essential for protecting an organization from attack. Vulnerability management typically involves the following steps: Identifying vulnerabilities: The first step is to identify vulnerabilities in an organization’s information systems and assets. This can be done through vulnerability scanning, penetration testing, and threat intelligence gathering. Assessing vulnerabilities: Once vulnerabilities have been identified, they need to be assessed to determine their severity and impact.

September 7, 2022 Read
Hero Image
Identity and Access Management (IAM): The Key to Securing Your Organization

Identity and access management (IAM) is a critical component of any organization’s security posture. IAM encompasses the processes and technologies used to manage identities and access to resources. By implementing effective IAM, organizations can reduce the risk of unauthorized access to sensitive data and systems. IAM typically includes the following components: Identity governance: This involves managing the lifecycle of identities, including creating, updating, and disabling accounts. Access control: This involves defining who has access to what resources and what actions they can take.

July 22, 2022 Read
Hero Image
Password Management: It's Not Just About Remembering Your Passwords

In today’s digital world, we are constantly bombarded with passwords. We need passwords for our email, our bank accounts, our social media accounts, and more. It can be hard to keep track of all of our passwords, and it can be even harder to create strong passwords that are difficult to guess. That’s where password management comes in. Password management is the process of storing and managing your passwords in a secure way.

July 21, 2022 Read
Hero Image
Attack Surface Management: Protecting Your Organization from Attack

Attack surface management (ASM) is the process of identifying, assessing, and mitigating the security risks associated with an organization’s attack surface. The attack surface is the sum of all potential ways that an attacker can gain access to an organization’s systems and data. ASM is an important part of any comprehensive security program. By identifying and mitigating security risks, ASM can help to prevent costly data breaches and other security incidents.

January 7, 2021 Read
Hero Image
Application Security Vulnerability Management

Application security vulnerability management (ASVM) is the process of identifying, assessing, and mitigating security vulnerabilities in applications. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing ASVM, including: Reduced risk of data breaches: By identifying and mitigating security vulnerabilities, organizations can reduce the risk of data breaches. Improved compliance: Organizations that implement ASVM can help to comply with security regulations, such as PCI DSS and HIPAA.

October 26, 2019 Read
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo