Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • OWASP Top 10 best practices for web applications
  • Data & Input Validation
  • Data & Input Sanitization
  • Peer-To-Peer Code Review

Vulnerability Assessment

Lexzur undergoes Lexzur undergoes an application vulnerability assessment test on an annual basis by an external cyber security firm. Moreover, Lexzur incorporates a weekly automated scan for application end points to check for any possible vulnerabilities.

Static Security Code Analysis

...