Risk: Weak cryptography leads to data exposure. Covers weak hashing, poor encryption, hardcoded keys, and insecure key management.
Replace weak algorithms, secure keys, and configure TLS. Understand common pitfalls like ECB mode and predictable IVs.
Migrate weak crypto, break poor implementations, and harden configurations with tests.
Use vetted libraries, centralize key management, and automate TLS hygiene checks.