Articles By Shyam Oza

Shyam Oza

Director of Product Management

As Director of Product Management, Shyam is responsible for understanding the needs of Spanning’s G Suite and Salesforce customers and defining the future of the company’s innovative line of products for protecting data in the cloud. Shyam brings 10 years of experience managing, marketing, designing, delivering, and supporting enterprise software products. Over the years he has done everything from teach video game design to transforming legacy enterprise business models to fully take advantage of SaaS technology and Agile methodologies. Shyam graduated from the New Jersey Institute of Technology with a B.A. in Information Systems and holds a CSPO® (Certified Product Owner) certification from the Scrum Alliance.

Salesforce Data Export: A Reliable Backup & Recovery Tool?

Salesforce Data Export allows you to export data from your Salesforce org for backup purposes. But is it a reliable backup and recovery tool?


READ MORE >


Types of Malware: How to Detect and Prevent Them

Malware attacks are costly and destructive. Learn about the different types of malware, how they work and how to protect your data from these threats.


READ MORE >


Salesforce Data Recovery Service: A Good Backup Option?

Salesforce retired — and then brought back — its data recovery service. Learn why it was reintroduced and why third-party backup is still a necessity.


READ MORE >


Spanning Backup for Salesforce Feature Retrospective

Here at Spanning, we’re constantly innovating. Get a look at some of the new capabilities we’ve added to Spanning Backup for Salesforce.


READ MORE >


File Inclusion Vulnerabilities — Web-based Application Security, Part 9

PHP File Inclusion represents a security flaw in web applications that can result in information disclosure. Learn more about LFI and RFI vulnerabilities.


READ MORE >


Directory Traversal — Web-based Application Security, Part 8

Directory traversal is a web application security vulnerability that allows unauthorized users to access files from different folders or directories that they would otherwise be restricted from accessing.


READ MORE >


Mobile Malware: What Makes It Dangerous?

Cybercriminals are using mobile malware to get their hands on business data stored on your smartphone. Learn all about the types of mobile malware out there and what protection measures you can take to repel them.


READ MORE >


Spanning Release Notes: Google Workspace Backup with Integrated Dark Web Monitoring

Spanning Backup for Google Workspace with Dark Web Monitoring provides complete front-end and back-end Google Workspace protection – secure credentials – secure data.


READ MORE >


Denial-of-Service (DoS) Attacks — Web-based Application Security, Part 7

A Denial-of-Service (DoS) attack is when legitimate users are unable to access a network. Learn how they work and how to protect against them.


READ MORE >


Insecure Direct Object Reference (IDOR) — Web-based Application Security, Part 6

Insecure Direct Object Reference (IDOR) vulnerabilities exist when direct object reference entities can be manipulated in order to gain access to otherwise private information. Learn how they work and how to protect against them.


READ MORE >

[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]