This presentation details what XXE is, its uses, and how it can be exploited.
To learn more about XXE processing, please read our blog post that breaks it down in detail here.
At VerSprite, we approach security from a holistic risk management perspective, understanding security from business and attacker perspectives.
Our approach goes beyond assessing security controls. We examine credible threats to understand the likelihood of a real-world abuse case and measure the magnitude of business impact if a breach should occur. By developing a holistic business risk view, security decisions become business decisions. Explore Security Offerings →
Slides & Presentations