A security analyst reported a cross-site request forgery vulnerability while reviewing a web application. Which of the following anti-forgery token implementation techniques would BEST help remediate the vulnerability without causing performance concerns?
Currently there are no comments in this discussion, be the first to comment!