Skip to content
Unknown's avatar

Stan Fleury, CISSP, CEH

Cybersecurity and Network Safety

  • Home
  • About
  • Resume
  • The Security Plan for Business

Author: stanfleury

IT guy primarily focused on Cloud computing, networking, security, and helping companies reach their goals by efficiently implementing technology. Born in Oakland and raised in Berkeley, Stan now resides in the rolling hills of San Ramon, California. He enjoys traveling, gardening and motorcycling.

First blog post

This is your very first post. Click the Edit link to modify or delete it, or start a new post. If you like, use this post to tell readers why you started this blog and what you plan to do with it.

stanfleury Uncategorized Leave a comment January 31, 2017January 31, 2017 1 Minute

Web Application Security Risks

OWASP Top 10
1. Injection
2. Broken Authentication
3. Sensitive Data Exposure
4. XML External Entities
5. Broken Access Control
6. Security Misconfiguration
7. Cross-Site Scripting
8. Insecure Deserialization
9. Using Components with
Known Vulnerabilities
10. Insufficient logging and
Monitoring

Website Powered by WordPress.com.
    • Stan Fleury, CISSP, CEH
    • Sign up
    • Log in
    • Report this content
    • Manage subscriptions