Welcome to
Life at ESDS

ESDS Blogs and Accolades

Discover a world of possibilities. Explore our blog for expert insights, industry trends, and best practices.

07
Feb

Kitchen in the Cloud

Outside food is very easily accessible to everyone now with the advent of aggregator services like Swiggy, Zomato, UberEats, and other significant players. People mostly in cities now prefer eating at the comfort of their homes and avoid being stuck in traffic or even wasting time getting to these places. All this combined this with...
Read More
07
Feb

Understand the Relation of FaaS with Serverless

One thing you should keep in mind before starting to read this article and that is, Serverless architecture is not equal to FaaS (Functions as a Service). Serverless is not necessary to use FaaS, but FaaS is an essential component to use serverless computing. Serverless computing is gaining attention from all over the world because...
Read More
06
Feb

WHAT DO YOU KNOW ABOUT BROKEN AUTHENTICATION AND SESSION BREACH?

As we are covering OWASP top 10 vulnerabilities,broken authentication is one of it. Broken Authentication itself suggests the breach in the authentication procedure of a web application. Session management is the rule which checks for the interactions amid a web application and end-users. A web session is actually a transactional chain of HTTP commands and...
Read More
22
Jan

What are Injection Attacks and Their Types?

Several vulnerabilities are there from which you need to stay aware of, and the list of OWASP top 10 has mentioned the most dangerous ones. We are describing each vulnerability/attack people need to be cautious of. You can get to know about XXE attacks and LFI and RFI attacks as well. Now, we are giving...
Read More