<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Tushar Sharma</title>
    <description>The latest articles on DEV Community by Tushar Sharma (@tushar_sharma_1995).</description>
    <link>https://dev.to/tushar_sharma_1995</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3150143%2F34e0fe21-76ce-4104-a928-a2565c393839.png</url>
      <title>DEV Community: Tushar Sharma</title>
      <link>https://dev.to/tushar_sharma_1995</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/tushar_sharma_1995"/>
    <language>en</language>
    <item>
      <title>Why VAPT Matters: A Developer’s Take on Finding Security Gaps Early</title>
      <dc:creator>Tushar Sharma</dc:creator>
      <pubDate>Mon, 30 Jun 2025 14:55:17 +0000</pubDate>
      <link>https://dev.to/tushar_sharma_1995/why-vapt-matters-a-developers-take-on-finding-security-gaps-early-32ic</link>
      <guid>https://dev.to/tushar_sharma_1995/why-vapt-matters-a-developers-take-on-finding-security-gaps-early-32ic</guid>
      <description>&lt;p&gt;Let me be honest—there was a time I thought security testing was mostly hype. You know, another box to tick so someone in management could sleep better.&lt;/p&gt;

&lt;p&gt;That was before I saw firsthand how a sloppy configuration almost led to a serious incident. It wasn’t some movie plot hack, either. It was just a public bucket that shouldn’t have been public. Simple stuff. Embarrassing, really.&lt;/p&gt;

&lt;p&gt;That’s why I started paying attention to &lt;strong&gt;Vulnerability Assessment and Penetration Testing&lt;/strong&gt;, or VAPT if you prefer short names.&lt;/p&gt;

&lt;h2&gt;
  
  
  What VAPT Means Without the Buzzwords
&lt;/h2&gt;

&lt;p&gt;Here’s how I explain it when people ask:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A &lt;strong&gt;vulnerability assessment&lt;/strong&gt; is basically an inventory of what’s broken or outdated in your environment. No drama, just a list.&lt;/li&gt;
&lt;li&gt;A &lt;strong&gt;penetration test&lt;/strong&gt; is when someone tries to actually break in—on purpose, with permission.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Together, they give you a clear picture: what can go wrong, and how bad it could get if nobody fixes it.&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://cyberguardiansglobal.com/vulnerability-assessment-vs-penetration-testing/" rel="noopener noreferrer"&gt;Vulnerability Assessment vs Penetration Testing&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Stuff That Slips Through (Until It Doesn’t)
&lt;/h2&gt;

&lt;p&gt;I could name a dozen problems I’ve seen more than once:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Developers leaving credentials in old YAML files.&lt;/li&gt;
&lt;li&gt;Access rules that say “allow all” because it was easier in staging.&lt;/li&gt;
&lt;li&gt;Libraries with known exploits still sitting in production.&lt;/li&gt;
&lt;li&gt;Cloud storage folders set to public by default.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Sometimes it’s just a curious person with a search engine who finds them.&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://cyberguardiansglobal.com/common-cybersecurity-vulnerabilities/" rel="noopener noreferrer"&gt;Common Cybersecurity Vulnerabilities&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What Happens When You Bring in a VAPT Team
&lt;/h2&gt;

&lt;p&gt;If you’ve never worked with security testers, it’s not as intimidating as it sounds. Usually, it goes like this:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Scope&lt;/strong&gt;: You agree what’s in play and what’s not.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Recon&lt;/strong&gt;: They look at your exposed services, endpoints, and whatever else is visible.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Scan&lt;/strong&gt;: Automated tools hunt for low-hanging fruit.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit&lt;/strong&gt;: They try to prove the risks are real (safely).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report&lt;/strong&gt;: You get a document showing what needs fixing.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;More detail here if you’re curious:&lt;br&gt;
👉 &lt;a href="https://cyberguardiansglobal.com/vapt-process/" rel="noopener noreferrer"&gt;The VAPT Process&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Why You Shouldn’t Wait for a Breach
&lt;/h2&gt;

&lt;p&gt;Security isn’t always urgent—until it is. But it’s so much simpler to tackle vulnerabilities early.&lt;/p&gt;

&lt;p&gt;Doing VAPT helps you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Avoid nasty surprises during launches.&lt;/li&gt;
&lt;li&gt;Show clients you take data protection seriously.&lt;/li&gt;
&lt;li&gt;Check off compliance boxes before audits.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Mostly, it lets you get back to building without nagging worries.&lt;/p&gt;

&lt;h2&gt;
  
  
  A Few Tips if You’re New to This
&lt;/h2&gt;

&lt;p&gt;Here’s what I wish someone told me:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Start with systems that hold sensitive data.&lt;/li&gt;
&lt;li&gt;Ask questions if you don’t understand something—good testers will explain it in plain language.&lt;/li&gt;
&lt;li&gt;Keep records so you can track fixes over time.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 &lt;a href="https://cyberguardiansglobal.com/vapt-services" rel="noopener noreferrer"&gt;Explore Our VAPT Services&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What Have You Seen?
&lt;/h2&gt;

&lt;p&gt;If you’ve been through VAPT—or skipped it and regretted it—I’d like to hear your story. Sometimes a real example sticks better than a checklist. Feel free to share below!&lt;/p&gt;

</description>
      <category>security</category>
      <category>pentesting</category>
      <category>devops</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>So They Asked for Your Security Certs — Now What?</title>
      <dc:creator>Tushar Sharma</dc:creator>
      <pubDate>Mon, 12 May 2025 12:11:27 +0000</pubDate>
      <link>https://dev.to/tushar_sharma_1995/so-they-asked-for-your-security-certs-now-what-37p9</link>
      <guid>https://dev.to/tushar_sharma_1995/so-they-asked-for-your-security-certs-now-what-37p9</guid>
      <description>&lt;p&gt;I remember the first time a client asked,  &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Do you guys have a VAPT report or SOC 2?”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;I stared at the Zoom screen, nodded politely… and had absolutely no clue what that really meant.&lt;/p&gt;

&lt;p&gt;It’s one of those moments you don’t forget — because it sends you down a rabbit hole of terms, audits, and checklists that sound like they belong in a cybersecurity textbook.&lt;/p&gt;

&lt;p&gt;Here’s the version I wish someone gave me: the one that talks like a real person.&lt;/p&gt;




&lt;h3&gt;
  
  
  🧩 VAPT: Not a Trophy, But You’ll Want the Report
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;VAPT&lt;/strong&gt; stands for &lt;strong&gt;Vulnerability Assessment and Penetration Testing&lt;/strong&gt;. In simple terms? You hire someone to try breaking into your systems so you can fix the cracks before someone less friendly finds them.&lt;/p&gt;

&lt;p&gt;Despite how it’s often phrased, there’s no shiny “certificate.” What you get is a report — usually packed with technical terms and red flags — that proves you’ve done the work.&lt;/p&gt;

&lt;p&gt;That’s what people want when they ask for a &lt;strong&gt;&lt;a href="https://cyberguardiansglobal.com/vapt-services/" rel="noopener noreferrer"&gt;VAPT certificate&lt;/a&gt;&lt;/strong&gt;. They want to know you’ve had your setup tested, not that you’ve got a badge on your site.&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://cyberguardiansglobal.com/vapt-services/" rel="noopener noreferrer"&gt;We put our approach to VAPT here&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  🔒 SOC 2: Where Process Meets Reality
&lt;/h3&gt;

&lt;p&gt;If you’re running a SaaS product or handling any kind of sensitive data, &lt;strong&gt;SOC 2&lt;/strong&gt; will come up in conversation — fast.&lt;/p&gt;

&lt;p&gt;It’s not about software or tools. It’s about proving your company actually follows security policies — around data access, logging, backups, and so on.&lt;/p&gt;

&lt;p&gt;You don’t “get” SOC 2 by filling out a form. It’s a months-long process. You have to build discipline into how your team works. Then an external auditor checks if it holds up.&lt;/p&gt;

&lt;p&gt;People Google &lt;em&gt;“cost of SOC 2 certification”&lt;/em&gt; a lot. Sure, it’s not cheap. But most of the pain is in the prep — not the audit itself.&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://cyberguardiansglobal.com/soc-2-compliance/" rel="noopener noreferrer"&gt;What it takes to prepare for SOC 2&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  🌐 ISO 27001: The Global Trust Badge
&lt;/h3&gt;

&lt;p&gt;If SOC 2 is a North American thing, &lt;strong&gt;ISO 27001&lt;/strong&gt; is its international cousin — and it goes deeper.&lt;/p&gt;

&lt;p&gt;This one makes you look at how your entire company handles information. It’s not just policies. It’s risk assessments, controls, audits, and accountability baked into your day-to-day.&lt;/p&gt;

&lt;p&gt;The &lt;strong&gt;ISO 27001 certificate&lt;/strong&gt; is no joke. You don’t “buy” it — you earn it by proving you’ve built security into the bones of your organization.&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://cyberguardiansglobal.com/iso-27001-compliance/" rel="noopener noreferrer"&gt;We break down how ISO 27001 actually works here&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  🤝 Last Thought
&lt;/h3&gt;

&lt;p&gt;No one starts with this stuff figured out. And if someone says they did, they’re lying.&lt;/p&gt;

&lt;p&gt;You learn it by doing. By failing. By writing your first draft of a policy and realizing three weeks later it doesn’t reflect reality. That’s the job.&lt;/p&gt;

&lt;p&gt;So, if you’re looking into a &lt;strong&gt;VAPT certificate&lt;/strong&gt;, &lt;strong&gt;SOC 2 accreditation&lt;/strong&gt;, or &lt;strong&gt;ISO 27001 certification&lt;/strong&gt;, you’re not behind — you’re just at the beginning of a learning curve we all go through.&lt;/p&gt;

&lt;p&gt;Need help? I’ve walked that road. Happy to talk about it — no pitch, just perspective.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>compliance</category>
      <category>vapt</category>
    </item>
  </channel>
</rss>
