This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Mobile Top Ten Contributions"
From OWASP
(→Data) |
m (Update with synthesis v0.1) |
||
Line 22: | Line 22: | ||
* [mailto:[email protected] Chad Butler - Concur Technologies] | * [mailto:[email protected] Chad Butler - Concur Technologies] | ||
− | == Data == | + | == Data Contributors == |
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/mobile-application-security.html HP Fortify] | * [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/mobile-application-security.html HP Fortify] | ||
Line 37: | Line 37: | ||
* [http://www.securenetwork.it/ Secure Network] | * [http://www.securenetwork.it/ Secure Network] | ||
− | == | + | == Data == |
The 2015 data sets are stored at the below link: | The 2015 data sets are stored at the below link: | ||
[https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0 https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0] | [https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0 https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0] | ||
+ | |||
+ | == Synthesis == | ||
+ | |||
+ | Key observations and trends from the data can be found in here: | ||
+ | |||
+ | * [[Media:OWASP Mobile Top Ten 2015 - Synthesis Document v0.1.pdf|Synthesis Document v0.1]] | ||
== Additional Thanks == | == Additional Thanks == |
Revision as of 02:47, 2 March 2015
This page is a work in progress. If we have omitted you, or incorrectly affiliated you, please contact us right away.
Project Leads
Strategic Roadmap
Wiki Content
- Zach Lanier
- Mike Zuzman
- Jason Haddix - HP Fortify
- Daniel Miessler - HP Fortify
- Rahil Parikh - Gotham Digital Science
- Ron Gutierrez - Gotham Digital Science
- Jonathan Carter - Arxan Technologies
- Chad Butler - Concur Technologies
Data Contributors
- HP Fortify
- Andreas Athanasoulias & Syntax IT
- Hemil Shah and eSphere Security
- Godfrey Nolan and RIIS (Research Into Internet Systems)
- Arxan Technologies
- Bugcrowd
- Hacklabs
- IBM X-Force Threat Intelligence
- KRVW Associates
- MetaIntelli
- Pure Hacking
- Secure Network
Data
The 2015 data sets are stored at the below link:
https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0
Synthesis
Key observations and trends from the data can be found in here:
Additional Thanks
- Jim Mannico
- Paco Hope