Application security tips part 2 – SQL Injection

In part one of this series, I discussed the process of threat modeling an application. Once that step is done, you will have some concrete threats for which you need to prepare. Let's take a look at some of the threats that you would likely identify as part of the threat modeling exercise and how …

Continue reading Application security tips part 2 – SQL Injection