This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Mobile Top Ten Contributions"

From OWASP
Jump to: navigation, search
(Created page with "== Data == * [https://www.nvisium.com/ Nvisium Security] * [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/mobile-application-security.htm...")
 
m (Wiki Content)
 
(31 intermediate revisions by 8 users not shown)
Line 1: Line 1:
== Data ==
+
This page is a work in progress. If we have omitted you, or incorrectly affiliated you, please contact us right away.
 +
 
 +
== Project Leads ==
 +
 
 +
* [mailto:[email protected] Jason Haddix - HP Fortify]
 +
* [mailto:[email protected] Daniel Miessler - HP Fortify]
 +
* [mailto:[email protected] Jonathan Carter - Arxan Technologies]
 +
*[mailto:[email protected] Milan Singh Thakur]
 +
 
 +
== Strategic Roadmap ==
 +
 
 +
[[Media:OWASP Mobile Top Ten 2015 - Strategy.pdf|Strategy Document]]
 +
 
 +
== Wiki Content ==
 +
 
 +
* [mailto:[email protected] Chad Butler - Concur Technologies]
 +
* [mailto:[email protected] Jonathan Carter - Arxan Technologies]
 +
* Ron Gutierrez - Gotham Digital Science
 +
* [mailto:[email protected] Jason Haddix - HP Fortify]
 +
* [mailto:[email protected] Paco Hope - Cigital]
 +
* Zach Lanier
 +
* [mailto:[email protected] Daniel Miessler - HP Fortify]
 +
* [mailto:[email protected] Andrew Pannell - Pentest Limited]
 +
* Rahil Parikh - Gotham Digital Science
 +
* Mike Zuzman
 +
*[mailto:[email protected] Milan Singh Thakur]
 +
 
 +
== Data Contributors ==
  
* [https://www.nvisium.com/ Nvisium Security]
 
 
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/mobile-application-security.html HP Fortify]
 
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/mobile-application-security.html HP Fortify]
 
* [https://twitter.com/andresitoath Andreas Athanasoulias & Syntax IT]
 
* [https://twitter.com/andresitoath Andreas Athanasoulias & Syntax IT]
 
* [http://www.espheresecurity.com/ Hemil Shah and eSphere Security]
 
* [http://www.espheresecurity.com/ Hemil Shah and eSphere Security]
 
* [http://www.riis.com/ Godfrey Nolan and RIIS (Research Into Internet Systems)]
 
* [http://www.riis.com/ Godfrey Nolan and RIIS (Research Into Internet Systems)]
 +
* [http://www.arxan.com/ Arxan Technologies]
 +
* [http://www.cigital.com/ Cigital]
 +
* [http://www.bugcrowd.com/ Bugcrowd]
 +
* [http://www.hacklabs.com/ Hacklabs]
 +
* [http://www.ibm.com/security/xforce/ IBM X-Force Threat Intelligence]
 +
* [http://www.krvw.com/ KRVW Associates]
 +
* [http://www.metaintelli.com/ MetaIntelli]
 +
* [http://www.purehacking.com/ Pure Hacking]
 +
* [http://www.securenetwork.it/ Secure Network]
 +
*[https://aujas.com/ Aujas Networks]
 +
 +
== Data ==
 +
 +
The 2015 data sets are stored at the below link:
 +
 +
[https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0 https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0]
 +
 +
== Synthesis ==
 +
 +
Key observations and trends from the data can be found in here:
 +
 +
* [[Media:OWASP Mobile Top Ten 2015 - Final Synthesis.pdf|Synthesis Document]]
 +
 +
== Additional Thanks ==
 +
 +
* Jim Manico

Latest revision as of 10:32, 21 July 2016

This page is a work in progress. If we have omitted you, or incorrectly affiliated you, please contact us right away.

Project Leads

Strategic Roadmap

Strategy Document

Wiki Content

Data Contributors

Data

The 2015 data sets are stored at the below link:

https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0

Synthesis

Key observations and trends from the data can be found in here:

Additional Thanks

  • Jim Manico