8787 Keystone Crossing
Indianapolis, IN 46240
Software today is subjected to numerous vectors of attacks. The Internet world is a hostile world and our apps need to be expecting to encounter digital terrorists who want to use our applications to get inside our organization. In this session you’ll learn about some of the most common attack vectors for applications and what you can do about them. We’ll discuss techniques for protecting from user input including injection and cross site scripting attacks.