Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Security Information and Event Management (SIEM)

Security information and event management (SIEM) is a security solution that collects, aggregates, and analyzes security logs and events from across an organization’s IT infrastructure. SIEM solutions can be used to identify threats, investigate security incidents, and improve overall security posture. SIEM solutions typically collect data from a variety of sources, including: Network devices, such as firewalls and switches Security devices, such as intrusion detection systems (IDS) and intrusion prevention systems (IPS) Servers Endpoint devices, such as laptops and desktops Applications Once data is collected, SIEM solutions aggregate it and analyze it for suspicious activity.

April 3, 2023 Read
Hero Image
Application Security Monitoring

Application security monitoring is the process of continuously tracking and analyzing applications for security vulnerabilities and threats. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing application security monitoring, including: Early detection: By continuously monitoring applications, organizations can detect security vulnerabilities and threats early, before they can be exploited. Reduced risk of data breaches: By detecting and remediating security vulnerabilities early, organizations can reduce the risk of data breaches.

March 27, 2023 Read
Hero Image
Application security for system administrators

As a system administrator, you play a critical role in the security of your organization’s applications. You are responsible for managing the systems that applications run on and for protecting those systems from attack. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

March 7, 2023 Read
Hero Image
Embedded Systems Security

Embedded systems are everywhere. They control our cars, our homes, and our businesses. They are also increasingly connected to the internet, which makes them vulnerable to attack. Embedded systems security is the practice of protecting embedded systems from unauthorized access, modification, or destruction. It is a critical aspect of information security that is essential for protecting the confidentiality, integrity, and availability of embedded systems. There are a number of threats to embedded systems security, including:

February 8, 2023 Read
Hero Image
Application Security Governance

Application security governance is the process of establishing and maintaining a set of policies, processes, and controls to ensure the security of applications. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing application security governance, including: Reduced risk of data breaches: By implementing security controls and processes, organizations can reduce the risk of data breaches. Improved compliance: Organizations that implement application security governance can help to comply with security regulations, such as PCI DSS and HIPAA.

January 13, 2023 Read
Hero Image
Security Engineering

Security engineering is the application of engineering principles to the design, development, and operation of secure systems. It is a broad field that encompasses a wide range of topics, including: Security architecture: The design of secure systems and networks. Security analysis: The identification and assessment of security risks. Security testing: The evaluation of security controls to ensure that they are effective. Security assurance: The process of providing confidence that a system is secure.

December 6, 2022 Read
Hero Image
Security Testing

Security testing is a systematic process of evaluating an information system or product for vulnerabilities that could be exploited by attackers. It is an important part of any organization’s security program, as it can help to identify and fix security flaws before they can be exploited. There are a variety of different security testing methods that can be used, depending on the specific needs of the organization. Some of the most common methods include:

November 15, 2022 Read
Hero Image
API security

What is API Security? API security is the practice of protecting APIs from unauthorized access, use, modification, or disclosure. APIs are a critical part of modern software development, and they are increasingly being used to expose sensitive data and functionality. As a result, API security is a critical concern for organizations of all sizes. API Security Threats There are a number of threats that can impact API security, including: Unauthorized access: This is the most common type of API attack.

October 13, 2022 Read
Hero Image
Application security for software architects

As a software architect, you play a critical role in the security of your organization’s applications. You are responsible for designing and implementing applications that are secure by design. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

September 24, 2022 Read
Hero Image
Application Security Architecture

Application security architecture is the design of an application with security in mind. It is a critical part of any organization’s security posture, as it can help to protect applications from attack. There are a number of different approaches to application security architecture. One common approach is to use a defense-in-depth model. This model involves layering security controls throughout the application, from the development process to the deployment environment. Another common approach is to use security frameworks.

September 18, 2022 Read
Hero Image
Database Security: Keeping Your Data Safe

Databases are essential for storing and managing data. They are used by businesses of all sizes to store customer information, financial data, and other sensitive information. However, databases are also a target for attackers. Here are some of the key security challenges associated with databases: Data breaches: Databases can be breached, which can lead to the loss of sensitive data. Data corruption: Databases can be corrupted, which can lead to the loss of data or the inability to access data.

August 30, 2022 Read
Hero Image
Application Security Culture

Application security culture is the set of beliefs and attitudes that an organization has about the importance of security. A strong application security culture is essential for protecting applications from attack and data breaches. There are a number of things that organizations can do to create a strong application security culture. Some of the most important things include: Leadership commitment: Senior leaders must be committed to security and must communicate the importance of security to all employees.

July 29, 2022 Read
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo