Gandhi and Web Application Security: What and How?

Is there a better example of minimalism than Gandhi? Names like Buddha might pop in your brain, but truly no one has probably influenced the 20th century more than Gandhi. His philosophy of life and affection towards simpler ways has made him an international name associated with a lot of good.

Without any doubt, individuals from all walks of life can learn amazing things from him. In fact, his lessons and philosophy also resonate with web application security in interesting ways. Here are some of his Indusface favorites that can inspire security in your organization.

“Nobody can hurt me without my permission.”

Many will argue against the statement especially in this vulnerable web world, but Gandhi has a powerful idea to offer here. When he said that nobody can hurt me, he believed in accepting all the criticism while protecting his soul from negativity and hate of the world.

Similarly, web application security is all about testing yourself against every kind of negativity, but still keeping the core of your system untouched and clean. It should be subject to a threat only when you want it.

 “The future depends on what you do today.”

There was a time when hacking was relatively simpler. It was confined to funny graphics and system crash for a while. However, in the last two decades, it evolved tremendously to everyone’s surprise. Only the organizations that have managed to secure their networks have been able to stand against the test of time.

Similarly, this Gandhian philosophy cannot be any truer than today when organizations face the real question of laying a security foundation that will serve them in the coming years.

“Actions express priorities.”

Simply put, if you have been avoiding something, it is simply not important enough for you. In fact, according to several security experts, if your organization is not taking important decisions on web app strengthening today, you will be hacked sooner or later. So, if you really care about it, prioritize it in your actions and decisions.

“No one can ride on the back of a man unless it is bent.”

As much as it is true for humans, the statement holds true for every organization trying to protect itself against vulnerabilities. The idea behind this thought is to ensure that your measures are strong enough not to let anyone in.

Once you are sure that your application has been tested against almost everything, your organization does not have to worry about someone riding the back, figuratively.

“It is unwise to be too sure of one’s own wisdom. It is healthy to be reminded that the strongest might weaken and the wisest might err.”

Finally, the gem of being self-critical about your security is precious beyond limits. Often companies talk about how their system is completely secure and end up losing a lot of data in pride. It’s never too late to evaluate your security mechanisms even if you believe that it’s the best in the industry.

Every single day new threats evolve and you can never predict and be prepared to secure systems against them. It is rather wise to consider loopholes every once in a while.

Venkatesh Sundar

Venky is an Application Security technologist who built the new age Web application Scanner and Cloud WAF - AppTrana at Indusface as a Founding CTO. Currently, he spends his time on driving Product Roadmap, Customer Success, Growth, and technology adoption for US businesses.

This post was last modified on October 13, 2023 16:08

Share
Venkatesh Sundar
Published by
Venkatesh Sundar

Recent Posts

Indusface Recognized as a 2024 Gartner® Peer Insights™ Customers’ Choice for Cloud WAAP

Indusface has once again been recognized as a Gartner® Peer Insights™ Customers' Choice for Cloud… Read More

6 hours ago

Managed WAF: A Must-Have to Stop Website Attacks

A Managed WAF is a comprehensive cybersecurity service offered by specialized providers to oversee, optimize,… Read More

5 days ago

Top 10 Best Practices for Attack Surface Reduction

Explore crucial tactics like Asset Inventory, Patch Management, Access Control & Authentication, and additional best… Read More

2 weeks ago