Chandan BhattacharyainCyber Security AdvocacyA Guide to Container SecurityAn article that outlines a Container Security Framework to provide insights into essential container security practices for organizations5d ago5d ago
Chandan BhattacharyainCyber Security AdvocacyGuide for an effective Cybersecurity budget for startupsAn article providing key insights on how startups can develop an effective cybersecurity budget to achieve their cybersecurity objectivesJul 6Jul 6
Chandan BhattacharyainCyber Security AdvocacyGuide for an Effective Application Security programAfter a decade of consulting experience in the cybersecurity space, when I take a retrospective view of the Application Security posture of…Jun 29Jun 29
Chandan BhattacharyainCyber Security AdvocacyCreate a comprehensive API security programWith the prevalence of APIs across the software ecosystem, APIs are increasingly becoming targets for cyberattacks, with a 30% rise in…Jun 22Jun 22
Chandan BhattacharyainCyber Security AdvocacyBuild an API Security FrameworkThis article provides insights into how organizations can assess and build their API security framework to protect their APIs.Jun 14Jun 14
Chandan BhattacharyainCyber Security AdvocacyHow to assess your DevSecOps MaturityDevSecOps, the practice of embedding security practices within the DevOps process, ensures that security is a core component of software…Jun 7Jun 7
Chandan BhattacharyainCyber Security AdvocacyBuild a Cybersecurity Talent FrameworkIn today’s digital age, organizations often use sophisticated security platforms to counter constantly evolving cyber security threats but…Jun 1Jun 1
Chandan BhattacharyainCyber Security AdvocacyBuild a Vulnerability Management ProgramWith the rise in cyber security breaches in today’s increasingly digitized business landscape, it has become imperative for organizations…May 25May 25
Chandan BhattacharyainCyber Security AdvocacyBuild a Secure Architecture Review programA Secure Architecture Review is essential for safeguarding an organization’s IT infrastructure against evolving cyber threats. By…May 19May 19
Chandan BhattacharyainCyber Security AdvocacyAdopting an Open-Source GRC platformIn the last series of articles, I attempted to explore the various components of a cybersecurity governance program and important…May 18May 18