Nitesh Malviya

Nitesh Malviya is a Security Consultant. He has prior experience in Web Appsec, Mobile Appsec and VAPT. At present he works on IoT, Radio and Cloud Security and open to explore various domains of CyberSecurity. He can be reached on his personal blog - https://nitmalviya03.wordpress.com/ and Linkedin - https://www.linkedin.com/in/nitmalviya03/.
Nitesh Malviya

DevSecOps: Continuous Integration Continuous Delivery (CI-CD) tools

In the last piece, we went through the various tools that can be integrated into the DevOps Pipeline to implement security at the different stages of the sof

DevSecOps Tools of the trade

Dig into the DevSecOps tools, including Source Composition Analysis and Static Analysis Security Testing, used in cybersecurity work.

Introduction to DevSecOps and its evolution and statistics

Learn about the growth of DevSecOps and key statistics associated with it for 2022.

Understanding the DevSecOps Pipeline

Learn more about DevSecOps, a DevSecOps Pipeline, the concept of Shift Left, what it is and why the Shift Left mindset is becoming essential.

9 best practices for network security

Network security is important for every organization, no matter how big or small. Here are some best practices.

Structures of cryptography

Cryptography is an important way to keep data safe. Learn about cryptography features and how cryptography works.

Role of digital signatures in asymmetric cryptography

Digital signatures are used for verification and authentication. See the steps to create a digital signature — and their applications.

How to run a software composition analysis tool

Learn the pros and cons of software composition analysis (SCA) and how it can help protect your application from attacks.

How to run a SAST (static application security test): tips & tools

Learn the pros and cons of static application security testing (SAST) and how it can help protect your application from attacks.

How to run an interactive application security test (IAST): Tips & tools

Learn the pros and cons of interactive application security testing (IAST) and how it can help protect your application from attacks.

How to run a dynamic application security test (DAST): Tips & tools

Learn the pros and cons of dynamic application security testing (DAST) and how it can help protect your application from attacks.

Introduction to SIEM (security information and event management)

Learn all about SIEM, a software system that collects and aggregates data and events from various networking devices and resources.