Skip to content

Details

OWASP's technology specific top 10 lists have provided a ton of value, but it's time for a different approach to business logic abuse. The rise of APIs and complex business logic attacks requires a new taxonomy that isn't tied to a specific technology.

In this talk we'll explore the newly published Business Logic Abuse Top 10 list, including the methodology behind it.

Events in Atlanta, GA
Application Security
Cybersecurity
Web Application Security
Web Security
Information Security

Members are also interested in