
· Alex · security
Cloud Application Security
Challenges, best practices and Cloud Service Providers.

Challenges, best practices and Cloud Service Providers.

From input validation, to using parametrized queries, prepared statements, ORMs and more

What is Broken Access Control, how to identify and mitigation strategies

Types of mobile hacking, steps to cleaning an infected device and how to avoid re-infection

What are worms, brief history and remediation strategies

What is a blind SQL injection, examples, how to detect and mitigation strategies.