Blog

Student Blog Site

Sponsored by Agency M-1

Consider Subscribing to our Agency M-1 Blog

Posts about

Security

Modern Peer Code Review Strategies

Are Modern Peer Code Review Strategies Good Enough To Ensure Software Security? Almost every week, we can find some news articles publishing occurrences of software security breaches such as hacking, data loss, data leakage, and unauthorized access. For example, fraud.org provides an updated list of the recent high-profile data breaches. Breaches such as Equifax , Yahoo, and Capital One have been estimated to cost more than 100 million dollars to the respective companies. Each of those breaches were enabled by software security vulnerabilities.