2022-11-01 | By Yuning Liang
As seL4 moves onto automotive applications, having industry standards will be a big step forward for mass adoption. Iso 26262 ASIL-D is well known...
read the story
2022-06-28 | By Deepcomputing
Introducing ROMA - the world’s first RISC-V laptop. With cutting-edge features, ROMA lets you directly expand and explore the native RISC-V development...
read the story
2021-10-19 | By Jason Lu
In the OWASP Top Ten list, the number 5 vulnerability is Broken Access Control. This is concerned with how web applications grant systems access to...
read the story
2021-10-14 | By Gavin Bu
From smart-locks at homes to self-driving vehicles on the road, new technologies such as artificial intelligence, blockchain, and 5G continue to promote the...
read the story
2021-09-14 | By Yanwen Lu
Our Product Manager, Yanwen, shares her insights on how to prioritize customer satisfaction by actively maintaining communication with customers, and deliver static code analysis tools...
read the story
2021-08-26 | By Tan Rahman
Up to 90% of software security problems are caused by defects in source code. Coding standards are critical to eliminate vulnerabilities. Our latest blog post...
read the story
2021-08-09 | By Jason Lu
The safest way to prevent XXE is to always disable External Entities completely. Disabling these also makes the parser secure against denial of services (DOS...
read the story
2021-07-16 | By Jianxin Lai
Most technologists agree that Moore’s Law, the two-fold increase of the number of transistors placed upon a chip each year, has come to...
read the story
2021-06-09 | By Jane Yang
The next blog article in our OWASP Top Ten series is number 3, Sensitive Data. When your data is at rest, in transit or in...
read the story
2021-05-18 | By Tan Rahman & Jane Yang
In this blog article, we explore some of the pitfalls faced by developers when using lower-level compiled languages with the Internet of Things...
read the story