2022-11-01 | By Yuning Liang
As seL4 moves onto automotive applications, having industry standards will be a big step forward for mass adoption. Iso 26262 ASIL-D is well known...
read the story
2021-10-19 | By Jason Lu
In the OWASP Top Ten list, the number 5 vulnerability is Broken Access Control. This is concerned with how web applications grant systems access to...
read the story
2021-10-14 | By Gavin Bu
From smart-locks at homes to self-driving vehicles on the road, new technologies such as artificial intelligence, blockchain, and 5G continue to promote the...
read the story
2021-08-26 | By Tan Rahman
Up to 90% of software security problems are caused by defects in source code. Coding standards are critical to eliminate vulnerabilities. Our latest blog post...
read the story
2021-08-09 | By Jason Lu
The safest way to prevent XXE is to always disable External Entities completely. Disabling these also makes the parser secure against denial of services (DOS...
read the story
2021-06-09 | By Jane Yang
The next blog article in our OWASP Top Ten series is number 3, Sensitive Data. When your data is at rest, in transit or in...
read the story
2021-05-18 | By Tan Rahman & Jane Yang
In this blog article, we explore some of the pitfalls faced by developers when using lower-level compiled languages with the Internet of Things...
read the story
2021-05-06 | By Jason Lu
Broken Authentication ranks No. 2 in the OWASP top ten list and despite being easily countered, is an all too often-seen problem in software...
read the story
2021-04-02 | By Jason Lu
The first article of our OWASP Top Ten series, injection...
read the story
2021-02-04 | By Tan Rahman & Jane Yang
"Shipping first time code is like going into debt. A little debt speeds development so long as it is paid back promptly with a rewrite...
read the story