This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Automation Threats to Web Applications"
From OWASP
(→News and Events) |
(Road map / getting involved updated) |
||
Line 54: | Line 54: | ||
* [20 May 2015] Meeting at project summit in Amsterdam | * [20 May 2015] Meeting at project summit in Amsterdam | ||
+ | * [27 Feb 2015] Work underway | ||
== In Print == | == In Print == | ||
Line 89: | Line 90: | ||
= Road Map and Getting Involved = | = Road Map and Getting Involved = | ||
− | + | The project's roadmap was updated in March 2015: | |
− | |||
− | |||
− | |||
− | |||
+ | * Feb-March 2015: Research on automated threats to web applications | ||
+ | * April 2015: Application owner interviews and creation of initial project outputs | ||
+ | * May 2015: Publication of outputs and request for review/data | ||
+ | * Jun-Sep 2015: Gathering of additional contributions, updates to outputs, and translations. | ||
+ | Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. If you would like to find out more, or have knowledge to contribute, please contact, me directly or using the project's mailing list: | ||
+ | * [mailto:[email protected] Colin Watson] | ||
+ | * (awaiting project mailing list to be set up) | ||
Revision as of 18:04, 26 March 2015
Contributors
The project's roadmap was updated in March 2015:
- Feb-March 2015: Research on automated threats to web applications
- April 2015: Application owner interviews and creation of initial project outputs
- May 2015: Publication of outputs and request for review/data
- Jun-Sep 2015: Gathering of additional contributions, updates to outputs, and translations.
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. If you would like to find out more, or have knowledge to contribute, please contact, me directly or using the project's mailing list:
- Colin Watson
- (awaiting project mailing list to be set up)