Author Archive: Lindsay Nash

In the previous blog post a high level overview of the application security space was presented. In Part Two below, vulnerability types and discovery methodologies are discussed.