With the increase in AI sophistication and AI adoption in businesses and industries, businesses are facing an unprecedented era of cyberattacks. It has been estimated that by the end of 2025, cybercrime will cost businesses up to $10.5trillion, and the trend suggests that it could reach as high as $15.63 trillion by 2029 (VIKINGCLOUD).

Why is this a concern?
One of the major aims of an entrepreneur in establishing a business is to make a profit and see it grow into a conglomerate. This dream can be cut short by not giving security proper attention in all aspects of the establishment. The security considerations needed should include physical as well as equipment/applications used in the day-to-day activities of the business.

The Role of a Secured Code
As a software engineer, it has become imperative that secure coding becomes our watchword in every line of code we write. It is no longer enough to blindly copy an AI-generated code or code snippet from a random source without making an effort to analyze and understand what every line represents, as there might be some form of vulnerability in the code snippet, even though it works. A few extra lines of code can significantly increase and enhance the security of your application by ensuring all users are validated for authorization before accessing any resource or performing any transaction.

During code review, an Application Security Engineer/ Cybersecurity Specialist assigned to review the application before going to production should, as a matter of security need, include tools like SonarQube, Burp Suite, Checkmarx, etc, for SAST and DAST tests, etc, ensuring that the code is properly reviewed at the static and running state.

Journey with me as we x-ray Applications from the eye of OWASP Top 10 Web Application Security Risks with code examples in the coming episodes, as the Community is gearing up to release the OWASP Top 10:2025 in the coming weeks. This is intended to help reduce the attack surface and guard applications against the CVEs (Common Vulnerabilities and Exposures), thereby producing a robust and more secure application.

Next …
Secure Coding in line with OWASP Top 10 Web Application Security Risks


Leave a Reply

Your email address will not be published. Required fields are marked *