Posted on
in Presentations
Due to the increase in cloud-based attacks, we picked three devastating and evasive real-world scenarios to show how attackers can gain access and move laterally in SaaS applications to perform reconnaissance and steal sensitive data. This session will show how attackers can exploit API, administrative, and user session vectors to access data in SaaS applications.
DevSecOps & Application Security Hackers & Threats
application security cloud security data security exploit of vulnerability hackers & threats
Topic
DevSecOps & Application Security
Hackers & Threats
Subtopic
application security
cloud security
data security
exploit of vulnerability
hackers & threats
Share With Your Community