Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a non-profit organization that provides information about web application security. OWASP is a community-driven organization that relies on the contributions of volunteers from all over the world. OWASP has a number of resources available to help developers, security professionals, and organizations improve the security of their web applications. These resources include: OWASP Top 10: The OWASP Top 10 is a list of the most critical web application security risks.

July 13, 2022 Read
Hero Image
Web Application Firewall (WAF)

A Web Application Firewall (WAF) is a security device that monitors and filters HTTP traffic between a web application and the internet. WAFs are designed to protect web applications from a variety of attacks, including cross-site scripting (XSS), SQL injection, and denial-of-service (DoS) attacks. WAFs work by inspecting HTTP traffic and identifying patterns that are associated with attacks. When a WAF identifies a suspicious pattern, it can take a variety of actions, such as blocking the traffic, logging the traffic, or rewriting the traffic.

January 18, 2022 Read
Hero Image
Web Development Security

Web development is a complex and ever-evolving field. But there are a number of things that developers can do to help protect their web applications from attack. Here are some of the most important things that developers can do to improve their web application security: Use secure coding practices: There are a number of secure coding practices that developers can follow to help prevent vulnerabilities in their code. These practices include things like input validation, output encoding, and error handling.

January 16, 2022 Read
Hero Image
Web Application Security Testing (WAST)

Web application security testing (WAST) is the process of identifying and assessing security vulnerabilities in web applications. It is an important part of any organization’s information security program. WAST can be conducted manually or using automated tools. Manual WAST is typically more thorough, but it can be time-consuming and expensive. Automated WAST is less thorough, but it can be conducted quickly and easily. The results of a WAST can be used to prioritize security efforts, to develop mitigation strategies, and to improve the overall security posture of an organization.

February 14, 2021 Read
Hero Image
Application security for web developers

As a web developer, you play a critical role in the security of your organization’s web applications. You are responsible for writing secure code that protects sensitive data and prevents attackers from exploiting vulnerabilities. Here are some key things to keep in mind when it comes to web application security: Web applications are a target: Web applications are a valuable target for attackers. They can be used to steal data, disrupt operations, or even launch attacks on other systems.

December 12, 2020 Read
Hero Image
Web Application Security

Web applications are a critical part of our lives. We use them to shop, bank, and communicate with friends and family. But web applications are also a target for attackers. Every day, attackers try to exploit vulnerabilities in web applications to steal data, disrupt services, or cause damage. Web application security is a complex and ever-evolving field. But there are a number of things that organizations can do to protect their web applications from attack.

April 30, 2020 Read
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo