Blog

OWASP #3 Sensitive Data Exposure

9 Jun 2021 | By Xcalibyte

The next blog article in our OWASP Top Ten series is number 3, Sensitive Data. When your data is at rest, in transit or in...

read the story

Embedded Programming and IoT – Memory Management Criticality

18 May 2021 | By Tan Rahman & Jane Yang

In this blog article, we explore some of the pitfalls faced by developers when using lower-level compiled languages with the Internet of Things...

read the story

OWASP #2 – Broken Authentication

6 May 2021 | By Jason Lu

Broken Authentication ranks No. 2 in the OWASP top ten list and despite being easily countered, is an all too often-seen problem in software...

read the story

The Growing Risk of Security Debt!

4 Feb 2021 | By Tan Rahman & Jane Yang

"Shipping first time code is like going into debt. A little debt speeds development so long as it is paid back promptly with a rewrite...

read the story

The ‘Must Know’ Facts about Open-Source Vulnerabilities!

30 Nov 2020 | By Jane Yang

INFOGRAPHIC – With most enterprises around the world regularly using open source components for their software development, projects become more manageable by tapping into the...

read the story

Q&A with Nick Wu – Helping Our Clients Through DevSecOps!

5 Nov 2020 | By Nick Wu

Nick Wu is the Product Development Director at Xcalibyte, responsible for internal DevOps and post-sales technical support & services. Q:’DevSecOps’ (Development Security Operations...

read the story

Let’s Talk About Sensitive Data!

14 Sep 2020 | By Shaw Xiao

In the digital age, the biggest concern on everyone’s mind is data security. Data breaches and loss of sensitive data frequently appears in the...

read the story

Are You Guilty of Embedding Credentials into Your Source Code?

16 Jul 2020 | By Qing Zhu

Everyone fears that their usernames and passwords will be exposed to malicious hackers so why do many developers still use embedded credentials in their software...

read the story

Open Source Software and the Threats That Come with It!

18 May 2020 | By Johanna Cui

In the past five years, the growth and adoption of open-source technology have stepped into full stride and has penetrated all aspects of software...

read the story

The importance of ‘Shift-Left’ testing in the SDLC!

25 Mar 2020 | By Yuning Liang

What is ‘shift-left’ in the field of DevOps and security? Traditional testing is done in the QA stage of the software development process which...

read the story

By using our site, you acknowledge that you have read and understand our Cookie Policy and Privacy Policy