Submitted by Raghu Mitra (@raghumitra) on Thursday, 18 July 2013
In this session we will discuss how to work around them, should there be any need.
Even after the security policies mentioned above, programmers need to take care of many other vulnerabilities like cross-site-scripting (XSS), cross-site-request-forgery ( CSRF) etc.
In this session we will discuss how to fill these security loop holes.
Raghu & Rahul
We are SSE's working for Citrix R&D India Ltd. We work on providing UI for a bunch of networking products. Developing UI for an enterprise networking product that can be public facing sometimes has given us exposure to various security threats and by far we were successful in mitigating them :).
We would like to share our knowledge and understand more about the common security issues faced by enterprise web applications.