Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Dynamic Application Security Testing (DAST): A Hands-On Approach

Dynamic application security testing (DAST) is a type of security testing that scans a web application for vulnerabilities while it is running. DAST tools send simulated attacks to the application and then analyze the application’s responses to identify potential vulnerabilities. DAST is a valuable tool for identifying security vulnerabilities in web applications. However, it is important to note that DAST is not a silver bullet. DAST tools cannot find all vulnerabilities, and they can sometimes generate false positives.

December 27, 2019 Read
Hero Image
Application Security Vulnerability Management

Application security vulnerability management (ASVM) is the process of identifying, assessing, and mitigating security vulnerabilities in applications. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing ASVM, including: Reduced risk of data breaches: By identifying and mitigating security vulnerabilities, organizations can reduce the risk of data breaches. Improved compliance: Organizations that implement ASVM can help to comply with security regulations, such as PCI DSS and HIPAA.

October 26, 2019 Read
Hero Image
Application security for software engineers

As a software engineer, you play a critical role in the security of your organization’s applications. You are responsible for writing secure code that protects sensitive data and prevents attackers from exploiting vulnerabilities. Here are some key things to keep in mind when it comes to application security: Applications are a target: Applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

October 11, 2019 Read
Hero Image
Application security for security professionals

Application security is a critical part of any organization’s overall security posture. As a security professional, it is important to understand the risks of application security and to take steps to mitigate those risks. Here are some of the key risks of application security: Data breaches: Application security vulnerabilities can be exploited by attackers to steal sensitive data, such as customerPII, financial information, or intellectual property. Disruption: Application security vulnerabilities can be exploited by attackers to disrupt business operations, such as by taking down websites or disabling critical applications.

September 23, 2019 Read
Hero Image
Application Security Training

Application security training is the process of teaching developers, testers, and other stakeholders about the security of applications. It is an essential part of any organization’s overall security program. There are a number of benefits to providing application security training, including: Reduced risk of data breaches: By teaching developers and testers about security, organizations can reduce the risk of data breaches. Improved compliance: Organizations that provide application security training can help to comply with security regulations, such as PCI DSS and HIPAA.

September 21, 2019 Read
Hero Image
Container Security: Keeping Your Applications Safe

Containers are a popular way to deploy applications. They offer a number of advantages, such as portability, scalability, and efficiency. However, containers also introduce new security challenges. Here are some of the key security challenges associated with containers: Image vulnerabilities: Containers are built from images, which are essentially snapshots of a filesystem. Images can contain vulnerabilities, which can be exploited by attackers. Runtime vulnerabilities: Containers run on hosts, which are also subject to vulnerabilities.

September 18, 2019 Read
Hero Image
Security Awareness Training

Security awareness training is a critical component of any organization’s security program. It is designed to educate employees about security risks and how to protect themselves and the organization from attack. There are a number of different security awareness training programs available. Some of the most common programs include: Online training: Online training is a convenient and cost-effective way to deliver security awareness training. It can be accessed by employees from any location and at any time.

September 3, 2019 Read
Hero Image
Application Security Awareness

Application security awareness is the process of educating and informing employees about the security risks associated with applications. It is a critical part of any organization’s security program, as it can help to prevent employees from making mistakes that could lead to data breaches or other security incidents. There are a number of different ways to raise application security awareness among employees. One common approach is to provide training on security best practices.

August 9, 2019 Read
Hero Image
Application Security Best Practices

Application security is a critical aspect of any organization’s overall security posture. By following best practices, organizations can help to protect their applications from attack and data breaches. Here are some application security best practices: Use a secure development lifecycle (SDLC). The SDLC is the process of developing, testing, and deploying applications. A secure SDLC includes security activities throughout the entire process, from requirements gathering to maintenance. Implement secure coding practices.

July 11, 2019 Read
Hero Image
Browser Security

Browser security is the practice of securing web browsers from attack. It is an important part of overall information security, as web browsers are often used to access sensitive information, such as financial data and personal information. There are a number of different threats to browser security, including: Malicious websites: Malicious websites can contain malware, such as viruses and worms, that can infect browsers and steal data. Phishing attacks: Phishing attacks are emails or websites that are designed to trick users into entering their personal information, such as passwords and credit card numbers.

March 8, 2019 Read
Hero Image
Application security for developers

Application security is a critical part of any organization’s overall security posture. Developers play a key role in ensuring that applications are secure, and there are a number of things that they can do to help protect applications from attack. Here are some tips for application security for developers: Use secure coding practices: Secure coding practices are a set of guidelines that can be used to write secure code. These guidelines can help to prevent vulnerabilities from being introduced into applications.

January 17, 2019 Read
Hero Image
Wireless Security

Wireless networks are becoming increasingly popular, as they offer the convenience of being able to connect to the internet from anywhere in a home or office. However, wireless networks are also more vulnerable to attack than wired networks. Here are some tips for securing your wireless network: Choose a strong password: Your wireless network password should be at least 12 characters long and include a mix of upper and lowercase letters, numbers, and symbols.

January 16, 2019 Read
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo