Preetham Nagesh

My Blogs

  • AI x Security: Unveiling the Intersection of Cybersecurity and Artificial Intelligence

    Introduction The rapid advancement of technology has transformed our daily lives, bringing unprecedented convenience and efficiency. However, this progress also poses significant challenges in terms of security and privacy. With the growing sophistication of cyber threats, traditional cybersecurity measures are proving insufficient. In response, artificial intelligence (AI) is increasingly being leveraged to strengthen defenses and

    Read more

  • Threat modeling: essential for any modern security strategy

    Threat modeling is a process that helps organizations identify and prioritize potential security threats. It’s done by analyzing the system’s vulnerabilities and risks, and taking steps to prevent them

    Read more

  • Dependencies: A potential liability in your software security

    Vulnerabilities in dependencies can threaten software security if not properly managed. Keeping dependencies updated, monitoring for security updates and avoiding known vulnerable dependencies are important steps to protect against potential threats.

    Read more

  • Don’t let your secrets slip into the source

    It is generally a good idea to keep sensitive information such as passwords, API keys, and database credentials out of your source code and configuration files. These should be stored in a secure location and accessed at runtime or during the build process.

    Read more