Official Blog Of Krutik Poojara
  • Home
  • Stay Safe Online
  • About me
  • Contact

Official Blog Of Krutik Poojara

  • Home
  • Stay Safe Online
  • About me
  • Contact
  • Home
  • Stay Safe Online
  • About me
  • Contact

Official Blog Of Krutik Poojara

General Security Stay Safe Online

Stay Secure on WhatsApp: A Simple Guide for Everyday Users

Security Startups

Securing Your Startup: Implementing Role-Based Security Strategies

Stay Safe Online

What Are Deepfakes and How to Protect Yourself?

Application Security Secure by Design Software Security

STRIDE-Threat Modeling Technique

Application Security Secure by Design Security Software Security

Threat Modeling, The first step towards security in Software Development life cycle (SDLC)

General Security Stay Safe Online

Security Guidelines for working from Home

General Security Stay Safe Online

Stay Secure on WhatsApp: A Simple Guide for Everyday Users

Posted on May 9, 2025 by Krutik Poojara

A few weeks ago, a friend messaged me in a panic:“Someone’s using my name and photo to message people on WhatsApp. They’re pretending to be me and asking my contacts

Application Security Secure by Design Software Security

Is Your API a Sitting Duck? Why You Need a Security Score for Every API

Posted on April 13, 2025 by Krutik Poojara

Have you ever wondered: Welcome to the world of API Security Scoring—a game-changer for organizations serious about reducing their attack surface, boosting DevSecOps accountability, and staying compliant in a threat-heavy,

Security Startups

Securing Your Startup: Implementing Role-Based Security Strategies

Posted on January 30, 2025 by Krutik Poojara
Securing Your Startup by Krutik Poojara

Founders often ask me how they can secure their applications, systems, and networks without overwhelming their limited resources. I’ve written this article to help startups embed security into their DNA

Secure by Design Security Software Security

Building Resilient Systems with Security By Design at ISACA Silicon Valley

Posted on January 17, 2025 by Krutik Poojara

Delivered at ISACA Silicon Valley – January 16, 2025 On January 16, I had the honor of speaking at ISACA Silicon Valley on a topic that’s close to my heart: Threat Modeling –

Stay Safe Online

What Are Deepfakes and How to Protect Yourself?

Posted on October 14, 2024 by Krutik Poojara

Have you ever wondered if that viral video is real or fake? What if someone could make a video of you saying something you never said? These are the realities

Application Security Mobile Application Security Security Software Security

Understanding OWASP Mobile top 10

Posted on September 5, 2021 by Krutik Poojara

Mobile applications are everywhere—from managing your finances to unlocking your car. But with convenience comes risk. In 2016, OWASP (Open Web Application Security Project) released its Mobile Top 10 list

Application Security Secure by Design Software Security

STRIDE-Threat Modeling Technique

Posted on October 20, 2020 by Krutik Poojara

Also Published On Cybrary, on October 15, 2020 Threat modeling is the security process by which we can identify, categorize, and analyze threats. It can be utilized to identify the

Application Security Secure by Design Security Software Security

Threat Modeling, The first step towards security in Software Development life cycle (SDLC)

Posted on June 5, 2020 by Krutik Poojara

Threat modeling is the security process by which we can identify, categorize, and analyze the threats. Generally, threat modeling is done at an early stage in the software development lifecycle

General Security Stay Safe Online

Security Guidelines for working from Home

Posted on May 10, 2020 by Krutik Poojara

Most of us are working from home due to the current situation that has arisen from COVID-19. At the office, there is an infrastructure to protect you while accessing the

1 2 next
  • Home
  • Stay Safe Online
  • About me
  • Contact
Krutik Poojara
Copyright © 2025 KrutikPoojara.com