About This Episode
At the end of this episode, you'll be able to:
1. Understand why application logs are a common attack target
2. Spot log sanitization issues within the following areas
b) Basic authentication connection strings
d) Sensitive url parameters
I started my tech tutorial journey when I was bedridden for 6 months because I couldn't get healthcare insurance. While I might of been in extreme physical pain, I persisted because the instructors that I watched during that time filled me with immense joy. Towards the end of that experience, I vowed that once I gained the appropriate expertise, I'd provide quality tutorial content to the greater tech community.
In the years after my disability, I've held positions as a Frontend Developer, Backend Developer, Application Security Engineer and a DevOps/Security Engineer. My professional path has ranged from large corporate settings to an intimate blockchain startup.
Now, the next progression in my journey is to take all of my experience and provide quality security tutorials to the greater tech community.