Ubiq Blog

Application-Layer Encryption Authentication Compliance Cryptography Data Security Developers DevSecOps Encryption Key Management News Privacy Ransomware Zero Trust

Exploring CWE-326 Inadequate Encryption Strength

Introduction The OWASP Top Ten list provides in-depth information about the most common security issues facing web applications. Number two on the list is A02:2021 – Cryptographic Failures, which covers a wide range of common mistakes. When implementing cryptographic functionality in their code, developers may struggle to determine what cryptographic algorithms and settings are “good […]

Read More

Get the latest from Ubiq

Sign up so we can keep you up to date on encryption, security, and technology.

    By clicking "Sign Up" you agree to the processing of your personal data by Ubiq as described in our Privacy Policy. You can unsubscribe at any time by reaching out to support@ubiqsecurity.com.

    Exploring CWE-325: Missing Cryptographic Step

    Read More

    Exploring CWE-324: Use of a Key Past its Expiration Date

    Read More

    Exploring CWE-323 Reusing a Nonce, Key Pair in Encryption

    Read More

    What is format-preserving encryption (FPE) and its benefits?

    Read More
    Load More