Proactive Application Hardening with SCA Runtime Protection
In this talk, we explain how Runtime Protection works technically and then will show a live demo with an actual application being owned by Metasploit initially via an Apache Struts CVE, followed by the same attack thwarted by Runtime Protection after blocking the vulnerable method from being executed.