Articles By Shyam Oza

Shyam Oza

Director of Product Management

As Director of Product Management, Shyam is responsible for understanding the needs of Spanning’s G Suite and Salesforce customers and defining the future of the company’s innovative line of products for protecting data in the cloud. Shyam brings 10 years of experience managing, marketing, designing, delivering, and supporting enterprise software products. Over the years he has done everything from teach video game design to transforming legacy enterprise business models to fully take advantage of SaaS technology and Agile methodologies. Shyam graduated from the New Jersey Institute of Technology with a B.A. in Information Systems and holds a CSPO® (Certified Product Owner) certification from the Scrum Alliance.

Insecure Direct Object Reference (IDOR) — Web-based Application Security, Part 6

Insecure Direct Object Reference (IDOR) vulnerabilities exist when direct object reference entities can be manipulated in order to gain access to otherwise private information. Learn how they work and how to protect against them.


READ MORE >


Ryuk Ransomware — Malware of the Month, January 2020

In the world of malware, Ryuk ransomware has gone from a rookie to a pro at a disturbing speed. Here we take a look at what Ryuk ransomware is, how it spreads, and how to protect your business from it.


READ MORE >


Dridex — Malware of the Month, December 2019

Dridex — a malware specifically designed to attack financial services organizations and banks — is Spanning’s Malware of the Month for December 2019. Learn how it has evolved and resulted in the theft of hundreds of millions of dollars from institutions in the form of fraudulent transactions.


READ MORE >


Deepfake: The AI Endangering Your Cybersecurity 

How dangerous is deepfake to cybersecurity? The AI-based forgery is creating fear among businesses due to its growing popularity among cybercriminals.


READ MORE >


Zeus Virus AKA Zbot – Malware of the Month, November 2019

The Zeus Virus, or Zbot, is a crafty and undetectable strain of malware that has been rather resilient and shown a strong ability to evolve since its first detection in 2007. For that reason, it’s our Malware of the Month for November, 2019.


READ MORE >


Identity Theft on the Dark Web: Understanding the Full Impact of a Data Breach

The dark web has made identity theft a “lucrative business” which is leading to more pervasive and ingenious attacks – often targeting your customer’s credentials. Learn how to protect your data, business reputation, and customer base.


READ MORE >


Kovter – Malware of the Month, October 2019

Kovter — a malware that has evolved from a trojan-based ransomware to a click fraud malware and then to a fileless one — is Spanning’s Malware of the Month for October 2019. Learn how Kovter works and how it has stayed among the most prolific malware in recent years.


READ MORE >


XML External Entity (XXE) Attacks — Web-based Application Security, Part 5

XML External Entity (XXE) attacks are a form of injection attack that target weak XML parsers with the goal of exposing confidential information that should typically not be accessible. Learn how they work and how to protect against them.


READ MORE >


TrickBot – Malware of the Month, August 2019

TrickBot, at its root, is a form of Trojan malware. Like its namesake, malware of this type cleverly disguises its true intent. What’s even more dangerous is that TrickBot is constantly evolving with increasingly potent attacks. Learn more about our Malware of the Month for August, 2019, and what you can do to stay prepared.


READ MORE >


CIA Triad: Best Practices for Securing Your Org

The CIA Triad, or Confidentiality-Integrity-Availability, is a flexible model that can be applied to help secure your organization’s information systems, applications, and network. Learn about the three pillars of the framework and how you can implement them into your org’s information security protocol.


READ MORE >