Our White papers
Commonplace Programming Patterns that lead to Data Leakage
In this paper, we will discuss data breaches and privacy risks from these two angles, namely unauthorised cyber activity and authorised data processing. We will examine common programming patterns that fail to prevent unauthorised access to data, and also patterns that may lead to data being processed then made available for unintended use. Knowing these common programming patterns is the first step to properly detect and prevent such breaches or risks. We will discuss techniques needed for tools to automatically detect potential violations. Automatic detection is important for businesses to safeguard and prevent risk at its root. We will also discuss the need for adaptation to an organisation’s business requirements and software systems so that such tools can effectively detect and protect as expected.