NOSQL web application vulnerabilities and mitigation
Amir Luckach at Global AppSec Tel Aviv 2019
NOSQL data storage systems have become very popular, due to their scalability and ease of use.
I will examine injection methods, CSRF vulnerabilities, and mitigation solutions.
Moreover, NOSQL does authentication, encryption, and role management is optional.
as a result, it is vulnerable to DOS, DDOS, and injection impact is more effective.
Amir Luckach
Endpoint security team leader, CyberArk
Experienced technical manager with more than 19 years of hands-on experience. During this time I've filled roles of development, team leading, project management, system engineering/architecture, research and managing development and QA teams in several countries.
I will examine injection methods, CSRF vulnerabilities, and mitigation solutions.
Moreover, NOSQL does authentication, encryption, and role management is optional.
as a result, it is vulnerable to DOS, DDOS, and injection impact is more effective.
Amir Luckach
Endpoint security team leader, CyberArk
Experienced technical manager with more than 19 years of hands-on experience. During this time I've filled roles of development, team leading, project management, system engineering/architecture, research and managing development and QA teams in several countries.