In the coming weeks, please expect to see training modules to describe how to protect your application against real internet threats. I’ll focus on two environments: PHP and Java/Tomcat. However, the concepts will be universal. Plus, instead of providing isolated chunks of code that might be hard to understand out of context, I’ll provide working […]