Saumick Basu
Saumick is a Technical Writer at Astra Security. He loves to write about technology and has deep interest in its evolution. Having written about spearheading disruptive technology like AI, and Machine Learning, and code reviews for a while, Information Security is his newfound love. He's ready to bring you along as he dives deeper.Work at Astra
- 68 Cloud Security Statistics to Be Aware of in 2025
- 20+Best Black Friday Deals on Cyber Security in 2023
- Smart Contract Auditing Services: Everything You Need to Know
- PCI Compliance on AWS: What You Need to Know
- CVE-2022-42889 a.k.a Text4Shell: The Problem & The Solutions
- Top 5 Security-as-a-Service Providers: Make the Right Choice
- 13 Web Application Penetration Testing Service Providers
- PCI Compliance Scan – The Basics, and the Best Tool
- Qualys Vulnerability Scanner Review (2025) & Top Alternative
- 7 Top Cyber Security Auditors for SaaS Companies in 2025 (Reviewed)
- Top 10 Cyber Security Audit Companies in 2025 (and Services)
- 13 Best Web Application Vulnerability Scanners (Reviewed)
- Cloud Security Audit: Everything You Need to Know
- 5 SaaS Security Certifications to Wrap Your Head Around
- Managed Vulnerability Scanning Service – The Essential Guide
- AWS Vulnerability Scanning- A Complete Guide
- 8 SaaS Security Solutions & How to Choose the Right One [Reviewed]
- Astra Security is Now Partners with Sprinto
- Risk Assessment vs Vulnerability Assessment: A Detailed Discussion
- Vulnerability Assessment Report: A Beginners’ Guide
- What are Types of Vulnerability Scanning?
- What is Vulnerability Assessment?
- Vulnerability Scanning Report: Essentials You Need To Know
- Security Testing Software – 5 Things to Understand Before You Choose One
- Top 13 Web Application Penetration Testing Tools
- Top 10 Software Security Testing Tools [2024 Reviewed]
- 8 Best WordPress Cache Plugins – WordPress Caching Explained, Extensive List, Pros and Cons
- Top Pentest Tools in India – All You Need to Know
- Security Testing vs Pentesting: Which One Should You Choose?
- 6 Security Testing Methodologies Explained: Definitions, Processes, Checklist
- Breaking Down the Pentest Process: A 5-Step Guide
- 7 Penetration Testing Phases Explained: Ultimate Guide
