This blog is the first of a series dedicated to web application security – common vulnerabilities, threats, attacks, and protections. The emphasis will be also on on-demand applications – what cloud environments provide, what we need to know, what we...