>Securing Vulnerability Exploits with Apex – Part 3

Securing Vulnerability Exploits with Apex – Part 3 For my final security blog I will be looking at SQL injection and cross site scripting, both of which should always be considered when developing a web based application. Apex has in-built functionality to prevent these attacks and the following best practices will allow you to fully […]

>> Read More

How to, Security, Uncategorized / APEX 5.0, Security, Vulnerabilities / December 22, 2014

>Securing Vulnerability Exploits with Apex – Part 2

Securing Vulnerability Exploits with Apex – Part 2 Following on from my last blog, which focused on configuring access control within Apex, the focus of this blog is protecting the session state within an application. We will look at the common issues faced by developers and the tools available within Apex to protect your application. […]

>> Read More

How to, Security, Uncategorized / APEX 5.0, Security, Vulnerabilities / December 8, 2014

>APEX Security Considerations – Part 1

APEX Security Considerations – Part 1 Whenever you are developing a web based application, there are many security concerns that need to be considered. When developing using Oracle Apex, there are a number of in-built security features available to enhance Access Control and Session State Protection, and to also prevent SQL Injection and Cross Site […]

>> Read More

How to, Security, Uncategorized / APEX 5.0, Database, Security / November 25, 2014