
· Alex · security
Cloud Application Security
Challenges, best practices and Cloud Service Providers.
Challenges, best practices and Cloud Service Providers.
From input validation, to using parametrized queries, prepared statements, ORMs and more
What is Broken Access Control, how to identify and mitigation strategies
Types of mobile hacking, steps to cleaning an infected device and how to avoid re-infection
What are worms, brief history and remediation strategies
What is a blind SQL injection, examples, how to detect and mitigation strategies.