Data Security

Application Security | Data Security

Hashing, Encryption, Encoding, and Obfuscation: Understanding the Differences

In the realm of cybersecurity and data protection, four terms often surface: hashing, encryption, encoding, and obfuscation. While they may seem interchangeable at first glance, each serves a distinct purpose and offers unique advantages and limitations. There is often significant confusion around the differences between encryption, encoding, hashing, and obfuscation. Understanding the differences between these…

Application Security | Cyber Security | Data Security

Understanding the CIA Triad: The Foundation of Information Security

In the ever-evolving landscape of cybersecurity, it’s crucial to have a solid foundation to build upon. One such foundational concept is the CIA Triad, which stands for Confidentiality, Integrity, and Availability. This framework serves as a cornerstone for designing, implementing, and managing information security within organizations. In this blog post, we’ll delve into the CIA…

Application Security | Data Security | OWASP | Vulnerability

OWASP Top Ten: Cross-Site Scripting (XSS)

Welcome to Secumantra! In this post, we’re going to talk about the number seven vulnerability from OWASP Top Ten which is Cross-Site Scripting (XSS). Cross-site scripting is one of the most common security vulnerability in web applications today. These vulnerabilities can have consequences such as tampering and sensitive data theft. OWASP (Open Web Application Security…

Application Security | Data Security | OWASP | Vulnerability

OWASP Top Ten: Insecure Deserialization

Welcome to Secumantra! In this post, we’re going to talk about the number eight vulnerability from OWASP Top Ten – Insecure Deserialization. OWASP (Open Web Application Security Project) is a nonprofit foundation that works to improve the security of software. OWASP Foundation is globally recognized by developers as the first step towards more secure coding. It…

Application Security | Data Security | OWASP | Vulnerability

Insufficient Logging And Monitoring

Welcome to Secumantra! In this post, we’re going to talk about the number ten vulnerability from OWASP Top Ten – Insufficient Logging And Monitoring. OWASP (Open Web Application Security Project) is a nonprofit foundation that works to improve the security of software. OWASP Foundation is globally recognized by developers as the first step towards more secure…

Application Security | Data Security | OWASP | Vulnerability

OWASP Top 10: Security Misconfiguration

Welcome to Secumantra! In this post, we’re going to talk about the number six vulnerability from OWASP Top Ten – Security Misconfiguration. We have already covered top five vulnerabilities in our previous posts – injection, broken authentication , sensitive data exposure, XML external entities and broken access control. OWASP (Open Web Application Security Project) is a nonprofit…

Application Security | Cyber Security | Data Security

Top 10 Tips for Smartphone Data Security

Welcome to Secumantra! In this post we will discuss about a topic which is important for not only application developers but also to normal users of mobile devices. Mobile devices and smartphones have become so common in today’s world. In addition these devices are connected to internet and information is being exchanged continuously. This not…

Application Security | Data Security | OWASP | Vulnerability

Broken Access Control

Welcome to Secumantra! We have already covered top four vulnerabilities from OWASP Top Ten 2017 edition – injection, broken authentication , sensitive data exposure and XML external entities. In this post, we’re going to talk about the number five vulnerability – Broken Access Control. Broken Access Control covers all access control issues that can make your website vulnerable….