Blog

OWASP #3 Sensitive Data Exposure

9 Jun 2021 | By Xcalibyte

The next blog article in our OWASP Top Ten series is number 3, Sensitive Data. When your data is at rest, in transit or in...

read the story

Embedded Programming and IoT – Memory Management Criticality

18 May 2021 | By Tan Rahman & Jane Yang

In this blog article, we explore some of the pitfalls faced by developers when using lower-level compiled languages with the Internet of Things...

read the story

OWASP #2 – Broken Authentication

6 May 2021 | By Jason Lu

Broken Authentication ranks No. 2 in the OWASP top ten list and despite being easily countered, is an all too often-seen problem in software...

read the story

Verifying Business Logic in One Step, Saving a Hundred Steps Fixing Defects

4 Mar 2021 | By Dr. Long Li

In this article, Xcalibyte’s Chief Scientist, Long Li, looks at how Xcalibyte uses mathematical computational models to uncover defects and vulnerabilities in source code...

read the story

The Growing Risk of Security Debt!

4 Feb 2021 | By Tan Rahman & Jane Yang

"Shipping first time code is like going into debt. A little debt speeds development so long as it is paid back promptly with a rewrite...

read the story

Creating ‘Best in Class’ Tools for Static Code Analysis – Q&A with Sun Chan, CTO

7 Jan 2021 | By Sun Chan

In his latest Q&A session, Xcalibyte’s CTO, Sun Chan, shares some experiences from his admirable career, that all software developers will find insightful...

read the story

The ‘Must Know’ Facts about Open-Source Vulnerabilities!

30 Nov 2020 | By Jane Yang

INFOGRAPHIC – With most enterprises around the world regularly using open source components for their software development, projects become more manageable by tapping into the...

read the story

Q&A with Nick Wu – Helping Our Clients Through DevSecOps!

5 Nov 2020 | By Nick Wu

Nick Wu is the Product Development Director at Xcalibyte, responsible for internal DevOps and post-sales technical support & services. Q:’DevSecOps’ (Development Security Operations...

read the story

Are You Guilty of Embedding Credentials into Your Source Code?

16 Jul 2020 | By Qing Zhu

Everyone fears that their usernames and passwords will be exposed to malicious hackers so why do many developers still use embedded credentials in their software...

read the story

Open Source Software and the Threats That Come with It!

18 May 2020 | By Johanna Cui

In the past five years, the growth and adoption of open-source technology have stepped into full stride and has penetrated all aspects of software...

read the story

By using our site, you acknowledge that you have read and understand our Cookie Policy and Privacy Policy