<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=CISO_Survey_2013%3A_OWASP_project_list</id>
		<title>CISO Survey 2013: OWASP project list - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=CISO_Survey_2013%3A_OWASP_project_list"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CISO_Survey_2013:_OWASP_project_list&amp;action=history"/>
		<updated>2026-04-13T03:55:07Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CISO_Survey_2013:_OWASP_project_list&amp;diff=167603&amp;oldid=prev</id>
		<title>Tgondrom at 21:24, 6 February 2014</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CISO_Survey_2013:_OWASP_project_list&amp;diff=167603&amp;oldid=prev"/>
				<updated>2014-02-06T21:24:46Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 21:24, 6 February 2014&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[OWASP CISO Survey|&amp;lt; Back to the CISO Survey]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[OWASP CISO Survey|&amp;lt; Back to the CISO Survey]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;__NOTOC__&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;__NOTOC__&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;= Appendix B: References to selection of OWASP Guides and Projects =&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;= Appendix B: References to selection of OWASP Guides and Projects =&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l48&quot; &gt;Line 48:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 47:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Types of Application Security Metrics&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Types of Application Security Metrics&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;https://www.owasp.org/index.php/Types_of_application_security_metrics&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;https://www.owasp.org/index.php/Types_of_application_security_metrics&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category:OWASP CISO Survey Project]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Tgondrom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CISO_Survey_2013:_OWASP_project_list&amp;diff=167587&amp;oldid=prev</id>
		<title>Tgondrom: start references to projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CISO_Survey_2013:_OWASP_project_list&amp;diff=167587&amp;oldid=prev"/>
				<updated>2014-02-06T21:06:17Z</updated>
		
		<summary type="html">&lt;p&gt;start references to projects&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[[OWASP CISO Survey|&amp;lt; Back to the CISO Survey]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= Appendix B: References to selection of OWASP Guides and Projects =&lt;br /&gt;
&lt;br /&gt;
* Application Security FAQs&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Application_Security_FAQ&lt;br /&gt;
* Application Security Verification Standard (ASVS) Guide&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project&lt;br /&gt;
* Application Threat Modeling&lt;br /&gt;
https://www.owasp.org/index.php/Application_Threat_Modeling&lt;br /&gt;
* AppSec Training Videos&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series&lt;br /&gt;
* CLASP&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_CLASP_Project&lt;br /&gt;
* Cloud Business Continuity and Resiliency&lt;br /&gt;
https://www.owasp.org/index.php/Cloud-10_Business_Continuity_and_Resiliency&lt;br /&gt;
* Code Review Guide&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project&lt;br /&gt;
* Conference videos&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Video&lt;br /&gt;
* Cornucopia&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Cornucopia&lt;br /&gt;
* Development Guide&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Guide_Project&lt;br /&gt;
* Education projects&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Education_Project&lt;br /&gt;
* .NET Incident Response&lt;br /&gt;
https://www.owasp.org/index.php/.NET_Incident_Response&lt;br /&gt;
* Risk rating methodology&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology&lt;br /&gt;
* SAMM&lt;br /&gt;
http://www.opensamm.org/&lt;br /&gt;
* Secure Coding Practices&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide&lt;br /&gt;
* Secure Software Contract Annex&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Secure_Software_Contract_Annex&lt;br /&gt;
* Testing Guide&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Testing_Project&lt;br /&gt;
* Threat risk modeling&lt;br /&gt;
https://www.owasp.org/index.php/Threat_Risk_Modeling&lt;br /&gt;
* Top Ten Cloud Risks&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Cloud_%E2%80%90_10/Initial_Pre-Alpha_List_of_OWASP_Cloud_Top_10_Security_Risks&lt;br /&gt;
* Top Ten Mobile Application Risks&lt;br /&gt;
https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&lt;br /&gt;
* Top Ten Web Application Risks&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
* Types of Application Security Metrics&lt;br /&gt;
https://www.owasp.org/index.php/Types_of_application_security_metrics&lt;/div&gt;</summary>
		<author><name>Tgondrom</name></author>	</entry>

	</feed>