Information Technology Security Ecosystem – Part 1

While having a discussion, I thought of writing a blog covering all important layers of Information Technology Security ecosystem with some relevant links – so here it goes. Here are some important layers for the same: Physical security Hardware security Network security Endpoint security Application security Data security Identity and access management security Cloud /…… Continue reading Information Technology Security Ecosystem – Part 1

Differences between SAST and DAST – BARD Generated

SAST and DAST: Two Key Players in Application Security When it comes to protecting your software from malicious actors, you need a solid security strategy. Two crucial techniques in this arsenal are Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). Let’s break down what each does and how they differ: SAST: What…… Continue reading Differences between SAST and DAST – BARD Generated

Security & Cookie links @ www.Liferay.com – Part 1

List of Liferay security & cookie related links which includes Cookies, XSS, CSRF, OWASP, CORS, SSO, IAM, Service Action Policies and more: Known vulnerabilities: Known Vulnerabilities – Liferay Security statement: Security Statement | Liferay LXC Cloud security: DXP Cloud Security | Liferay Securing Liferay page: Securing Liferay – Liferay Learn Help center DXP 7.0: Liferay DXP Security Overview – Liferay…… Continue reading Security & Cookie links @ www.Liferay.com – Part 1

Encryption

We all have seen passwords, SSL, HTTPS, public private keys, hashing, salting, digital signature, biometrics, honeypots, vpn key generating token, etc. which are ways of achieving authentication, security and encryption. But what if we use our surroundings and few other parameters as a private key/password. You store profiles for your home, your office, garden you…… Continue reading Encryption