Commentary
Various symbols representing low-code/no-code development
Vulnerabilities & ThreatsOData Injection Risk in Low-Code/No-Code EnvironmentsOData Injection Risk in Low-Code/No-Code Environments
As the adoption of LCNC grows, so will the complexity of the threats organizations face.
byMalleswar Reddy Yerabolu, Senior Security Engineer, North Carolina Department of Health and Human Services
byMichael McLaughlin, Co-Leader, Cybersecurity and Data Privacy Practice Group, Buchanan Ingersoll & Rooney
byTony Holmes, Practice Lead, Practice Lead for Solutions Architects in the Public Sector, Pluralsight
byJeffrey Wells, Visiting Fellow, National Security Institute at George Mason University's Antonin Scalia Law School
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.