Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a non-profit organization that provides information about web application security. OWASP is a community-driven organization that relies on the contributions of volunteers from all over the world. OWASP has a number of resources available to help developers, security professionals, and organizations improve the security of their web applications. These resources include: OWASP Top 10: The OWASP Top 10 is a list of the most critical web application security risks.

July 13, 2022 Read
Hero Image
Application Security Education

Application security is a critical aspect of any organization’s overall security posture. By educating employees about security risks, organizations can help to prevent them from making mistakes that could lead to data breaches or other security incidents. There are a number of different ways to educate employees about application security. One common approach is to provide training on security best practices. This training can cover topics such as input validation, output encoding, and error handling.

July 8, 2022 Read
Hero Image
Application security for beginners

Application security is the practice of protecting software applications from attack. It is an important part of overall information security, as applications are often the targets of malicious actors. There are a number of different types of application security threats, including: Injection attacks: Injection attacks are a type of attack where an attacker injects malicious code into an application. This malicious code can then be executed by the application, which can lead to data loss, system disruption, or other problems.

July 2, 2022 Read
Hero Image
Cloud Security: Protecting Your Data in the Cloud

The cloud is a powerful tool that can help businesses of all sizes save time and money. However, it is important to remember that the cloud is not immune to security threats. In fact, cloud-based data is often more vulnerable to attack than on-premises data. This is because cloud-based data is stored in a shared environment, which makes it a more attractive target for attackers. Additionally, cloud-based data is often accessed over the internet, which makes it more vulnerable to interception.

April 30, 2022 Read
Hero Image
Mobile Application Security: A Critical Need in Today's World

In today’s world, mobile devices are ubiquitous. People use them for everything from staying connected with friends and family to conducting business. As a result, mobile applications are a valuable target for attackers. Mobile applications can be attacked in a variety of ways. Some of the most common attacks include: Data breaches: Attackers can steal sensitive data, such as financial information or personal identification numbers (PINs), from mobile applications. Malware infection: Attackers can install malware on mobile devices, which can then be used to steal data, track users’ activities, or even take control of the device.

March 3, 2022 Read
Hero Image
Application security for everyone

Applications are everywhere. We use them to shop, bank, work, and communicate. And as applications become more complex, they also become more vulnerable to attack. That’s why application security is important for everyone. Whether you’re a developer, architect, tester, user, or manager, you can play a role in keeping applications secure. Here are a few things you can do to help improve application security: Learn about application security: The first step to improving application security is to learn about it.

February 25, 2022 Read
Hero Image
Network Security Architecture

Network security architecture is the design of a network to protect it from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a critical aspect of information security that is essential for protecting the confidentiality, integrity, and availability of data. There are a number of different components that can be included in a network security architecture. Some of the most common components include: Firewalls: Firewalls are devices that filter network traffic and prevent unauthorized access to a network.

February 19, 2022 Read
Hero Image
Web Development Security

Web development is a complex and ever-evolving field. But there are a number of things that developers can do to help protect their web applications from attack. Here are some of the most important things that developers can do to improve their web application security: Use secure coding practices: There are a number of secure coding practices that developers can follow to help prevent vulnerabilities in their code. These practices include things like input validation, output encoding, and error handling.

January 16, 2022 Read
Hero Image
Application Security Compliance

Application security compliance is the process of ensuring that applications meet the security requirements of applicable regulations and frameworks. There are a number of different regulations and frameworks that organizations need to comply with, depending on their industry and the type of data they handle. Some of the most common regulations include: PCI DSS: The Payment Card Industry Data Security Standard is a set of security requirements for organizations that process credit and debit card payments.

January 7, 2022 Read
Hero Image
Wireless Security Architecture

Wireless networks are becoming increasingly ubiquitous, as more and more devices are connecting to the internet wirelessly. This trend is being driven by the growing popularity of mobile devices, such as smartphones and tablets. As wireless networks become more popular, they also become more attractive targets for attackers. This is because wireless networks are often easier to attack than wired networks. There are a number of security risks associated with wireless networks.

December 26, 2021 Read
Hero Image
Application Security Weaknesses

Application security weaknesses are vulnerabilities in applications that can be exploited by attackers to gain unauthorized access to systems or data. There are a number of different types of application security weaknesses, including: Injection flaws: Injection flaws occur when unvalidated or malicious data is injected into an application. This can lead to attackers executing arbitrary code on the system or gaining unauthorized access to data. Broken authentication and session management: Broken authentication and session management weaknesses occur when applications do not properly authenticate users or manage sessions.

October 27, 2021 Read
Hero Image
Security Training

What is security training? Security training is the process of educating employees about security risks and how to protect themselves and the organization from those risks. It is an important part of any organization’s security program, as it can help to reduce the risk of security incidents. Why is security training important? Security training is important because it helps to ensure that employees are aware of the security risks that they face and how to protect themselves from those risks.

September 2, 2021 Read
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo