Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Physical Security

Physical security is the protection of people, property, and physical assets from unauthorized access, damage, or theft. It is a critical aspect of information security that is essential for protecting the confidentiality, integrity, and availability of information. There are a number of threats to physical security, including: Burglary: Burglary is the unlawful entry into a building or other structure with the intent to commit a crime. Theft: Theft is the unlawful taking of another person’s property without their consent.

January 16, 2021 Read
Hero Image
Application security for web developers

As a web developer, you play a critical role in the security of your organization’s web applications. You are responsible for writing secure code that protects sensitive data and prevents attackers from exploiting vulnerabilities. Here are some key things to keep in mind when it comes to web application security: Web applications are a target: Web applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

December 12, 2020 Read
Hero Image
Application security for testers

As a tester, you play a critical role in the security of your organization’s applications. You are responsible for finding and fixing vulnerabilities in applications before they are deployed. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

November 29, 2020 Read
Hero Image
Application security for executives

Application security is a critical part of any organization’s overall security posture. As an executive, it is important to understand the risks of application security and to take steps to mitigate those risks. Here are some of the key risks of application security: Data breaches: Application security vulnerabilities can be exploited by attackers to steal sensitive data, such as customerPII, financial information, or intellectual property. Disruption: Application security vulnerabilities can be exploited by attackers to disrupt business operations, such as by taking down websites or disabling critical applications.

November 13, 2020 Read
Hero Image
Mobile Application Security Testing

Mobile applications are becoming increasingly popular, as they offer a number of benefits, such as convenience, portability, and flexibility. However, mobile applications also introduce new security challenges. Mobile application security testing is the process of identifying and mitigating security vulnerabilities in mobile applications. It is a critical part of the mobile application development lifecycle, as it can help to prevent security breaches and protect users from malicious attacks. There are a number of different methods that can be used to test mobile application security.

August 2, 2020 Read
Hero Image
Security Auditing

Security auditing is a systematic review of an organization’s security controls to determine their effectiveness. It is a critical component of any organization’s security program. The purpose of security auditing is to identify security weaknesses and to recommend improvements. Security audits can also be used to comply with regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) and the Sarbanes-Oxley Act (SOX). There are a number of different security auditing methods that can be used.

July 8, 2020 Read
Hero Image
Security Automation

Security automation is the use of technology to automate security tasks. This can help to reduce the risk of human error and to improve the efficiency of security operations. There are a number of different security tasks that can be automated, including: Vulnerability scanning: Vulnerability scanning can be automated to identify vulnerabilities in systems and applications. Patch management: Patch management can be automated to ensure that systems and applications are up to date with the latest security patches.

June 21, 2020 Read
Hero Image
Security Incident Response

Security incident response is the process of identifying, containing, and recovering from a security incident. It is a critical component of any organization’s security program. A security incident is any event that compromises the confidentiality, integrity, or availability of an organization’s information assets. Security incidents can be caused by a variety of factors, including: Human error: Human error is the most common cause of security incidents. This can include things like clicking on a phishing link, opening a malicious attachment, or using weak passwords.

June 8, 2020 Read
Hero Image
Application Security Metrics

Application security metrics are a critical part of any application security program. They help organizations to measure the effectiveness of their security efforts and to identify areas where improvement is needed. There are a number of different application security metrics that can be used. Some of the most common metrics include: Number of vulnerabilities found: This metric measures the number of vulnerabilities that are found in applications. Severity of vulnerabilities: This metric measures the severity of the vulnerabilities that are found.

May 4, 2020 Read
Hero Image
Web Application Security

Web applications are a critical part of our lives. We use them to shop, bank, and communicate with friends and family. But web applications are also a target for attackers. Every day, attackers try to exploit vulnerabilities in web applications to steal data, disrupt services, or cause damage. Web application security is a complex and ever-evolving field. But there are a number of things that organizations can do to protect their web applications from attack.

April 30, 2020 Read
Hero Image
Application security for managers

As a manager, you are responsible for the security of your organization’s applications. This means ensuring that applications are developed, deployed, and operated securely. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems. Applications are complex: Applications are complex pieces of software.

February 13, 2020 Read
Hero Image
System Security

System security is the process of protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a critical component of any organization’s information security program. There are a variety of different threats to system security, including: Hackers: Hackers are individuals who use their technical skills to gain unauthorized access to computer systems and networks. Viruses: Viruses are malicious software that can be used to damage or steal data from computer systems.

February 11, 2020 Read
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo