Articles By Shyam Oza

Shyam Oza

Director of Product Management

As Director of Product Management, Shyam is responsible for understanding the needs of Spanning’s G Suite and Salesforce customers and defining the future of the company’s innovative line of products for protecting data in the cloud. Shyam brings 10 years of experience managing, marketing, designing, delivering, and supporting enterprise software products. Over the years he has done everything from teach video game design to transforming legacy enterprise business models to fully take advantage of SaaS technology and Agile methodologies. Shyam graduated from the New Jersey Institute of Technology with a B.A. in Information Systems and holds a CSPO® (Certified Product Owner) certification from the Scrum Alliance.

Deepfake: The AI Endangering Your Cybersecurity 

How dangerous is deepfake to cybersecurity? The AI-based forgery is creating fear among businesses due to its growing popularity among cybercriminals.


Zeus Virus AKA Zbot – Malware of the Month, November 2019

The Zeus Virus, or Zbot, is a crafty and undetectable strain of malware that has been rather resilient and shown a strong ability to evolve since its first detection in 2007. For that reason, it’s our Malware of the Month for November, 2019.


Identity Theft on the Dark Web: Understanding the Full Impact of a Data Breach

The dark web has made identity theft a “lucrative business” which is leading to more pervasive and ingenious attacks – often targeting your customer’s credentials. Learn how to protect your data, business reputation, and customer base.


Kovter – Malware of the Month, October 2019

Kovter — a malware that has evolved from a trojan-based ransomware to a click fraud malware and then to a fileless one — is Spanning’s Malware of the Month for October 2019. Learn how Kovter works and how it has stayed among the most prolific malware in recent years.


XML External Entity (XXE) Attacks — Web-based Application Security, Part 5

XML External Entity (XXE) attacks are a form of injection attack that target weak XML parsers with the goal of exposing confidential information that should typically not be accessible. Learn how they work and how to protect against them.


TrickBot – Malware of the Month, August 2019

TrickBot, at its root, is a form of Trojan malware. Like its namesake, malware of this type cleverly disguises its true intent. What’s even more dangerous is that TrickBot is constantly evolving with increasingly potent attacks. Learn more about our Malware of the Month for August, 2019, and what you can do to stay prepared.


CIA Triad: Best Practices for Securing Your Org

The CIA Triad, or Confidentiality-Integrity-Availability, is a flexible model that can be applied to help secure your organization’s information systems, applications, and network. Learn about the three pillars of the framework and how you can implement them into your org’s information security protocol.


Stegware aka Steganography Malware – Malware of the Month, July 2019

Stegware, or Steganography Malware, is accomplished by concealing a file, message, image, or video within another of the same type for malicious purposes. Stegware’s relatively easy implementation and difficulty to detect have put it on the rise lately.


SQL Injection Attacks (SQLi) — Web-based Application Security, Part 4

SQL Injection attacks are accomplished via insertion of untrusted input in a valid command or query of a vulnerable SQL-driven website or database, which then maliciously alters the execution of that program. SQL Injection attacks are simple to execute, but potent enough to cause serious damage.


Top 3 Enterprise SaaS Data Protection Trends

Cloud computing has come of age, both in terms of adoption and evolution. In order to get more insight into cloud security and data protection trends, ESG surveyed 370 IT professionals responsible for data protection for their organization. Here are the top three enterprise SaaS data protection trends from ESG’s research on Data Protection Cloud Strategies.