Blog

OWASP #5 Broken Access Control

Uncategorized

19 Oct 2021 | By Jason Lu

In the OWASP Top Ten list, the number 5 vulnerability is Broken Access Control. This is concerned with how web applications grant systems access to...

read the story

Empowering Customers the Xcalibyte Way – An Interview with Gavin Bu

14 Oct 2021 | By Gavin Bu

From smart-locks at homes to self-driving vehicles on the road, new technologies such as artificial intelligence, blockchain, and 5G continue to promote the...

read the story

What is the Connection Between CERT & CWE?

26 Aug 2021 | By Tan Rahman

Up to 90% of software security problems are caused by defects in source code. Coding standards are critical to eliminate vulnerabilities. Our latest blog post...

read the story

OWASP #4 XML EXTERNAL ENTITIES (XXE)

Uncategorized

9 Aug 2021 | By Jason Lu

The safest way to prevent XXE is to always disable External Entities completely. Disabling these also makes the parser secure against denial of services (DOS...

read the story

OWASP #3 Sensitive Data Exposure

9 Jun 2021 | By Xcalibyte

The next blog article in our OWASP Top Ten series is number 3, Sensitive Data. When your data is at rest, in transit or in...

read the story

Embedded Programming and IoT – Memory Management Criticality

Uncategorized

18 May 2021 | By Tan Rahman & Jane Yang

In this blog article, we explore some of the pitfalls faced by developers when using lower-level compiled languages with the Internet of Things...

read the story

OWASP #2 – Broken Authentication

6 May 2021 | By Jason Lu

Broken Authentication ranks No. 2 in the OWASP top ten list and despite being easily countered, is an all too often-seen problem in software...

read the story

OWASP #1 Injection

Uncategorized

2 Apr 2021 | By Jason Lu

The first article of our OWASP Top Ten series, injection...

read the story

The Growing Risk of Security Debt!

4 Feb 2021 | By Tan Rahman & Jane Yang

"Shipping first time code is like going into debt. A little debt speeds development so long as it is paid back promptly with a rewrite...

read the story

The ‘Must Know’ Facts about Open-Source Vulnerabilities!

Uncategorized

30 Nov 2020 | By Jane Yang

INFOGRAPHIC – With most enterprises around the world regularly using open source components for their software development, projects become more manageable by tapping into the...

read the story

By using our site, you acknowledge that you have read and understand our Cookie Policy and Privacy Policy