Articles By Shyam Oza

Shyam Oza

Director of Product Management

As Director of Product Management, Shyam is responsible for understanding the needs of Spanning’s G Suite and Salesforce customers and defining the future of the company’s innovative line of products for protecting data in the cloud. Shyam brings 10 years of experience managing, marketing, designing, delivering, and supporting enterprise software products. Over the years he has done everything from teach video game design to transforming legacy enterprise business models to fully take advantage of SaaS technology and Agile methodologies. Shyam graduated from the New Jersey Institute of Technology with a B.A. in Information Systems and holds a CSPO® (Certified Product Owner) certification from the Scrum Alliance.

File Inclusion Vulnerabilities — Web-based Application Security, Part 9

PHP File Inclusion represents a security flaw in web applications that can result in information disclosure. Learn more about LFI and RFI vulnerabilities.


READ MORE >


Directory Traversal — Web-based Application Security, Part 8

Directory traversal is a web application security vulnerability that allows unauthorized users to access files from different folders or directories that they would otherwise be restricted from accessing.


READ MORE >


Mobile Malware: What Makes It Dangerous?

Cybercriminals are using mobile malware to get their hands on business data stored on your smartphone. Learn all about the types of mobile malware out there and what protection measures you can take to repel them.


READ MORE >


Spanning Release Notes: G Suite Backup with Integrated Dark Web Monitoring

Spanning Backup for G Suite with Dark Web Monitoring provides complete front-end and back-end G Suite protection – secure credentials – secure data.


READ MORE >


Denial-of-Service (DoS) Attacks — Web-based Application Security, Part 7

A Denial-of-Service (DoS) attack is when legitimate users are unable to access a network. Learn how they work and how to protect against them.


READ MORE >


How to Prepare for Salesforce Data Recovery Service End-Of-Life

The Salesforce Data Recovery Service End-of-Life will occur on July 31, 2020. Learn what the retirement of this feature means for administrators and how they can prepare for it. 


READ MORE >


Insecure Direct Object Reference (IDOR) — Web-based Application Security, Part 6

Insecure Direct Object Reference (IDOR) vulnerabilities exist when direct object reference entities can be manipulated in order to gain access to otherwise private information. Learn how they work and how to protect against them.


READ MORE >


Ryuk Ransomware — Malware of the Month, January 2020

In the world of malware, Ryuk ransomware has gone from a rookie to a pro at a disturbing speed. Here we take a look at what Ryuk ransomware is, how it spreads, and how to protect your business from it.


READ MORE >


Dridex — Malware of the Month, December 2019

Dridex — a malware specifically designed to attack financial services organizations and banks — is Spanning’s Malware of the Month for December 2019. Learn how it has evolved and resulted in the theft of hundreds of millions of dollars from institutions in the form of fraudulent transactions.


READ MORE >


Deepfake: The AI Endangering Your Cybersecurity 

How dangerous is deepfake to cybersecurity? The AI-based forgery is creating fear among businesses due to its growing popularity among cybercriminals.


READ MORE >