DEV Community

Sudip Sengupta profile picture

Sudip Sengupta

Solution Architect. Technical Copywriter.

Location Norwich, United Kingdom Joined Joined on  twitter website

Education

Masters of Computer Application & Mathematics

Work

Solution Architect

What Are Common Misconceptions About Agile and DevOps

What Are Common Misconceptions About Agile and DevOps

Comments
10 min read
DevOps: The Art Of Balancing Chaos And Control

DevOps: The Art Of Balancing Chaos And Control

Comments
5 min read
Phishing vs Spear Phishing: Which One Is More Dangerous?

Phishing vs Spear Phishing: Which One Is More Dangerous?

Comments
9 min read
Reverse Engineering Malware: Techniques And Tools For Analyzing And Dissecting Malicious Software

Reverse Engineering Malware: Techniques And Tools For Analyzing And Dissecting Malicious Software

Comments
7 min read
Efficient Microservices Communication: Role of RPC Framework in a Cloud-Native Ecosystem

Efficient Microservices Communication: Role of RPC Framework in a Cloud-Native Ecosystem

Comments
6 min read
Active/Passive And Active/Active Configuration In Storage Management

Active/Passive And Active/Active Configuration In Storage Management

Comments
3 min read
What Is An OCI-Compliant Container Image?

What Is An OCI-Compliant Container Image?

Comments
4 min read
How Hackers Steal Passwords And Methods To Stop Them?

How Hackers Steal Passwords And Methods To Stop Them?

1
Comments 1
13 min read
How To Prevent Credential Phishing Attacks – Tips & Lessons

How To Prevent Credential Phishing Attacks – Tips & Lessons

Comments
8 min read
Cybersecurity For Small Businesses: Protecting Your Most Valuable Assets

Cybersecurity For Small Businesses: Protecting Your Most Valuable Assets

Comments
9 min read
Leveraging Destructive and Non-destructive Testing in Application Development

Leveraging Destructive and Non-destructive Testing in Application Development

1
Comments
6 min read
What Is the CSRF Login Attack?

What Is the CSRF Login Attack?

1
Comments
7 min read
What Is a Javascript Injection Attack and How Is It Orchestrated?

What Is a Javascript Injection Attack and How Is It Orchestrated?

Comments
6 min read
What Is the Stored CSRF Vulnerability?

What Is the Stored CSRF Vulnerability?

1
Comments
7 min read
Http.Sys Remote Code Execution Vulnerability (Cve-2022-21907)

Http.Sys Remote Code Execution Vulnerability (Cve-2022-21907)

Comments
5 min read
What Is A Port Scan Attack?

What Is A Port Scan Attack?

Comments
5 min read
What is Directory Traversal in Cyber Security?

What is Directory Traversal in Cyber Security?

Comments
6 min read
Password Reset Poisoning – Attack Types and Prevention

Password Reset Poisoning – Attack Types and Prevention

1
Comments
6 min read
Securing Modern Systems With Access Control Lists

Securing Modern Systems With Access Control Lists

Comments
7 min read
What Is False Data Injection?

What Is False Data Injection?

Comments
8 min read
Guide to Enumeration Pentest: All You Need to Know

Guide to Enumeration Pentest: All You Need to Know

Comments
6 min read
What Are Common Vulnerabilities and Exposures (CVE)?

What Are Common Vulnerabilities and Exposures (CVE)?

2
Comments
5 min read
What Is Common Weakness Enumeration (CWE)?

What Is Common Weakness Enumeration (CWE)?

1
Comments
5 min read
Guide to Cybersecurity Audits – Types, Benefits & Best Practices

Guide to Cybersecurity Audits – Types, Benefits & Best Practices

2
Comments
7 min read
Server Side Includes – All You Need To Know About SSI

Server Side Includes – All You Need To Know About SSI

1
Comments
6 min read
Union-Based SQL Injection – Guide To Understanding & Mitigating Such Attacks

Union-Based SQL Injection – Guide To Understanding & Mitigating Such Attacks

3
Comments
6 min read
Latest Cyber Security Trends For Businesses

Latest Cyber Security Trends For Businesses

3
Comments
7 min read
What Is Footprinting/Fingerprinting in Cybersecurity? – Ultimate Guide

What Is Footprinting/Fingerprinting in Cybersecurity? – Ultimate Guide

3
Comments
5 min read
OWASP Top 10 Cryptographic Failures A02 – Explained

OWASP Top 10 Cryptographic Failures A02 – Explained

2
Comments
6 min read
XSS Vs CSRF Attacks – What Are The Differences?

XSS Vs CSRF Attacks – What Are The Differences?

2
Comments
7 min read
Your Guide to KPIs & Metrics in Cybersecurity

Your Guide to KPIs & Metrics in Cybersecurity

2
Comments
7 min read
A08:2021 – Software and Data Integrity Failures- Explained

A08:2021 – Software and Data Integrity Failures- Explained

4
Comments
5 min read
Server-Side Request Forgery (SSRF) Vulnerability

Server-Side Request Forgery (SSRF) Vulnerability

Comments
5 min read
Web Cache Poisoning – Ultimate Guide

Web Cache Poisoning – Ultimate Guide

3
Comments
6 min read
Enumeration Cyber Security

Enumeration Cyber Security

1
Comments
5 min read
HTTP Request Smuggling – The Ultimate Guide

HTTP Request Smuggling – The Ultimate Guide

3
Comments
7 min read
Insecure Direct Object Reference – IDOR Vulnerability

Insecure Direct Object Reference – IDOR Vulnerability

2
Comments
5 min read
Missing Function Level Access Control

Missing Function Level Access Control

1
Comments
4 min read
What Is Stored Xss And How To Prevent It

What Is Stored Xss And How To Prevent It

4
Comments
6 min read
Unvalidated Redirects And Forwards in Cyber Security

Unvalidated Redirects And Forwards in Cyber Security

6
Comments
4 min read
What is Password Attack

What is Password Attack

3
Comments
6 min read
Blind SQL Injection Vulnerability

Blind SQL Injection Vulnerability

2
Comments
6 min read
SAAS Compliance Requirements

SAAS Compliance Requirements

1
Comments
7 min read
Block Cipher Vs. Stream Cipher

Block Cipher Vs. Stream Cipher

1
Comments
7 min read
What Is A CSRF Token

What Is A CSRF Token

1
Comments
7 min read
Owasp Top Ten API Security

Owasp Top Ten API Security

2
Comments
7 min read
Best Practices To Secure Your API

Best Practices To Secure Your API

1
Comments
6 min read
Web Security Basics – Best Practice

Web Security Basics – Best Practice

6
Comments
6 min read
How To Prevent Clickjacking Attacks?

How To Prevent Clickjacking Attacks?

1
Comments
6 min read
XSS Attacks Best Prevention

XSS Attacks Best Prevention

1
Comments
8 min read
Why Is Application Security Important For Business?

Why Is Application Security Important For Business?

2
Comments
8 min read
Security Issues With WordPress

Security Issues With WordPress

4
Comments
10 min read
Best Practices For Graphql Security

Best Practices For Graphql Security

6
Comments
8 min read
How To Find A Vulnerability In A Website

How To Find A Vulnerability In A Website

2
Comments
6 min read
Understanding Persistent Volumes and PVCs in Kubernetes & OpenEBS

Understanding Persistent Volumes and PVCs in Kubernetes & OpenEBS

5
Comments
6 min read
Configuring EKS Observability with Grafana Loki and OpenEBS LVM Local PV

Configuring EKS Observability with Grafana Loki and OpenEBS LVM Local PV

1
Comments
6 min read
What Are The Five Steps Of Ethical Hacking?

What Are The Five Steps Of Ethical Hacking?

9
Comments
8 min read
Code Injection – Examples and Prevention

Code Injection – Examples and Prevention

5
Comments
7 min read
Sast, Dast, Iast, Rasp: Alphabet Soup Explained

Sast, Dast, Iast, Rasp: Alphabet Soup Explained

1
Comments
7 min read
Why OpenEBS 3.0 for Kubernetes and Storage?

Why OpenEBS 3.0 for Kubernetes and Storage?

1
Comments
10 min read
loading...