Commonplace Programming Patterns that Lead to Data Leakage

1 Nov 2019 | Whitepaper

What’s inside

In this paper, we will discuss data breaches and privacy risks from these two angles, namely unauthorised cyber activity and authorised data processing. We will examine common programming patterns that fail to prevent unauthorised access to data, and also patterns that may lead to data being processed then made available for unintended use. Knowing these common programming patterns is the first step to properly detect and prevent such breaches or risks. We will discuss techniques needed for tools to automatically detect potential violations. Automatic detection is important for businesses to safeguard and prevent risk at its root. We will also discuss the need for adaptation to an organisation’s business requirements and software systems so that such tools can effectively detect and protect as expected.

Fill the form below to download

    • By submitting this form, you agree to have a sales person contact you regarding our services
    • By submitting this form, you hereby agree to the terms and conditions in the Xcalibyte Privacy Policy and to the processing of your personal data as described therein.

By using our site, you acknowledge that you have read and understand our Cookie Policy and Privacy Policy