This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Mobile Top Ten Contributions"

From OWASP
Jump to: navigation, search
m (Wiki Content)
 
(19 intermediate revisions by 6 users not shown)
Line 5: Line 5:
 
* [mailto:[email protected] Jason Haddix - HP Fortify]
 
* [mailto:[email protected] Jason Haddix - HP Fortify]
 
* [mailto:[email protected] Daniel Miessler - HP Fortify]
 
* [mailto:[email protected] Daniel Miessler - HP Fortify]
 +
* [mailto:[email protected] Jonathan Carter - Arxan Technologies]
 +
*[mailto:[email protected] Milan Singh Thakur]
 +
 +
== Strategic Roadmap ==
 +
 +
[[Media:OWASP Mobile Top Ten 2015 - Strategy.pdf|Strategy Document]]
  
 
== Wiki Content ==
 
== Wiki Content ==
  
 +
* [mailto:[email protected] Chad Butler - Concur Technologies]
 +
* [mailto:[email protected] Jonathan Carter - Arxan Technologies]
 +
* Ron Gutierrez - Gotham Digital Science
 +
* [mailto:[email protected] Jason Haddix - HP Fortify]
 +
* [mailto:[email protected] Paco Hope - Cigital]
 
* Zach Lanier
 
* Zach Lanier
* Mike Zuzman
 
* [mailto:[email protected] Jason Haddix - HP Fortify]
 
 
* [mailto:[email protected] Daniel Miessler - HP Fortify]
 
* [mailto:[email protected] Daniel Miessler - HP Fortify]
 +
* [mailto:[email protected] Andrew Pannell - Pentest Limited]
 
* Rahil Parikh - Gotham Digital Science
 
* Rahil Parikh - Gotham Digital Science
* Ron Gutierrez - Gotham Digital Science
+
* Mike Zuzman
* [mailto:[email protected] Jonathan Carter - Arxan Technologies]
+
*[mailto:milan@owasp.org Milan Singh Thakur]
* [mailto:chad.butler@owasp.org Chad Butler - Concur Technologies]
 
  
== Data ==
+
== Data Contributors ==
  
 
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/mobile-application-security.html HP Fortify]
 
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/mobile-application-security.html HP Fortify]
Line 24: Line 33:
 
* [http://www.riis.com/ Godfrey Nolan and RIIS (Research Into Internet Systems)]
 
* [http://www.riis.com/ Godfrey Nolan and RIIS (Research Into Internet Systems)]
 
* [http://www.arxan.com/ Arxan Technologies]
 
* [http://www.arxan.com/ Arxan Technologies]
 +
* [http://www.cigital.com/ Cigital]
 +
* [http://www.bugcrowd.com/ Bugcrowd]
 +
* [http://www.hacklabs.com/ Hacklabs]
 +
* [http://www.ibm.com/security/xforce/ IBM X-Force Threat Intelligence]
 +
* [http://www.krvw.com/ KRVW Associates]
 +
* [http://www.metaintelli.com/ MetaIntelli]
 +
* [http://www.purehacking.com/ Pure Hacking]
 +
* [http://www.securenetwork.it/ Secure Network]
 +
*[https://aujas.com/ Aujas Networks]
 +
 +
== Data ==
 +
 +
The 2015 data sets are stored at the below link:
 +
 +
[https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0 https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0]
 +
 +
== Synthesis ==
 +
 +
Key observations and trends from the data can be found in here:
 +
 +
* [[Media:OWASP Mobile Top Ten 2015 - Final Synthesis.pdf|Synthesis Document]]
  
 
== Additional Thanks ==
 
== Additional Thanks ==
  
* Jim Mannico
+
* Jim Manico
* Paco Hope
 

Latest revision as of 10:32, 21 July 2016

This page is a work in progress. If we have omitted you, or incorrectly affiliated you, please contact us right away.

Project Leads

Strategic Roadmap

Strategy Document

Wiki Content

Data Contributors

Data

The 2015 data sets are stored at the below link:

https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0

Synthesis

Key observations and trends from the data can be found in here:

Additional Thanks

  • Jim Manico