Top Hat (small)Discover the multitude of ways that web apps fall prey to attackers, from creative feats that bypass validation filters to simple techniques that require nothing more than a web browser and a URL.

Mike Shema used to write software to automate security testing for web applications and now leads security teams that protect products, users, and their data. For fun he writes books and blog posts about information security, with an infusion of references to music (80s), sci-fi (apocalyptic), and horror (spooky) to keep the topics entertaining. He has presented at security conferences around the world.

Find his books at Amazon.

Read more articles on his other blog at Medium.

Check out code samples at GitHub.

Connect on LinkedIn.

%d bloggers like this: