This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Quote-Veracode Provides Visibility into Their Verification Process for the OWASP Top 10"
From OWASP
Line 3: | Line 3: | ||
This quote is part of the OWASP [[Quotes]] Project. You can find more details about this project on the [[Quotes]] homepage. | This quote is part of the OWASP [[Quotes]] Project. You can find more details about this project on the [[Quotes]] homepage. | ||
− | Date Drafted : July 28, 2010 | + | Date Drafted: July 28, 2010 |
− | Date Approved: | + | Date Approved: TBD |
− | This quote is currently under discussion. | + | This quote is currently under discussion. This quote is targeted to become final on August 4, 2010. |
==Quote== | ==Quote== | ||
− | + | <BR><BR><BR> | |
+ | |||
+ | <table width=75% align=center> | ||
+ | <tr><td>'''The OWASP Foundation is pleased to see Veracode using the OWASP Top 10 application security risks. Managing application security requires real visibility into exactly what has been verified and what has not. Veracode’s transparency around their combination of manual and automated verification techniques stands in stark contrast to those product vendors that wrongly and dangerously assert complete automated coverage and compliance with the Top 10.''' | ||
+ | </td></tr></table> | ||
+ | |||
+ | <BR><BR><BR> | ||
+ | |||
+ | ==Comments== | ||
+ | |||
+ | Please enter comments and alternative language on the [[Talk:Quote-Veracode Provides Visibility into Their Verification Process for the OWASP Top 10|Discussion Page]]. |
Revision as of 03:59, 31 July 2010
Status
This quote is part of the OWASP Quotes Project. You can find more details about this project on the Quotes homepage.
Date Drafted: July 28, 2010
Date Approved: TBD
This quote is currently under discussion. This quote is targeted to become final on August 4, 2010.
Quote
The OWASP Foundation is pleased to see Veracode using the OWASP Top 10 application security risks. Managing application security requires real visibility into exactly what has been verified and what has not. Veracode’s transparency around their combination of manual and automated verification techniques stands in stark contrast to those product vendors that wrongly and dangerously assert complete automated coverage and compliance with the Top 10. |
Comments
Please enter comments and alternative language on the Discussion Page.