We missed you this time around!
Security vulnerabilities aren’t just hypothetical—they’re real, from the MongoDB attack to the Log4Shell disaster, and they’re hiding in your code right now. In this session, we’ll explore the most common and dangerous flaws: SQL Injection, Deserialization Injection, and Logging Injection.
We’ll explain how these vulnerabilities work, why they’re so risky, and how to fix them through examples.
You'll leave with practical tips for safeguarding your applications, including best practices for SQL query parameterization, secure deserialization techniques, the importance of sanitizing logs, and how to use tooling to prevent these flaws more easily.
Audience Takeaways:
Deep understanding of SQL Injection, Deserialization Injection, and Logging Injection.
Practical code examples and fixes to secure your applications.
Insights into real-world case studies of major security breaches.
Tooling that will help us to commit safe code.
Platform Sponsors
Torc is a community-first platform bringing together remote-first software engineer and developer opportunities from across the globe. Join a network that’s all about connection, collaboration, and finding your next big move — together.
Join our community today!
Don't let broken lines of code, busted API calls, and crashes ruin your app. Join the 4M developers and 90K organizations who consider Sentry “not bad” when it comes to application monitoring. Use code “guild” for 3 free months of the team plan.
https://sentry.io
We missed you this time around!
Platform Sponsors
Torc is a community-first platform bringing together remote-first software engineer and developer opportunities from across the globe. Join a network that’s all about connection, collaboration, and finding your next big move — together.
Join our community today!
Don't let broken lines of code, busted API calls, and crashes ruin your app. Join the 4M developers and 90K organizations who consider Sentry “not bad” when it comes to application monitoring. Use code “guild” for 3 free months of the team plan.
https://sentry.io
Security vulnerabilities aren’t just hypothetical—they’re real, from the MongoDB attack to the Log4Shell disaster, and they’re hiding in your code right now. In this session, we’ll explore the most common and dangerous flaws: SQL Injection, Deserialization Injection, and Logging Injection.
We’ll explain how these vulnerabilities work, why they’re so risky, and how to fix them through examples.
You'll leave with practical tips for safeguarding your applications, including best practices for SQL query parameterization, secure deserialization techniques, the importance of sanitizing logs, and how to use tooling to prevent these flaws more easily.
Audience Takeaways:
Deep understanding of SQL Injection, Deserialization Injection, and Logging Injection.
Practical code examples and fixes to secure your applications.
Insights into real-world case studies of major security breaches.
Tooling that will help us to commit safe code.
Get in touch!
hi@guild.host