This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:Featured article"

From OWASP
Jump to: navigation, search
Line 5: Line 5:
 
<center>[http://www.fortifysoftware.com http://www.owasp.org/images/5/5d/Fortifysoftware_lowres.JPG]</center>
 
<center>[http://www.fortifysoftware.com http://www.owasp.org/images/5/5d/Fortifysoftware_lowres.JPG]</center>
  
OWASP will help manage the research as part of the new "Honeycomb" project, which is creating a comprehensive and integrated guide to the fundamental building blocks of application security, including principles, threats, attacks, vulnerabilities, and countermeasures.
+
OWASP will help manage the research as part of the new "Honeycomb" project, which is creating a comprehensive and integrated guide to the fundamental building blocks of application security, including [[:Category:Principle|principles]], [[:Category:Threat|threats]], [[:Category:Vulnerability|vulnerabilities]], [[:Category:Attack|attacks]], and [[:Category:Countermeasure|countermeasures]].
  
 
The full set of vulnerabilities and the research that accompanies it is available in the [[:Category:OWASP Honeycomb Project|OWASP Honeycomb Project]].
 
The full set of vulnerabilities and the research that accompanies it is available in the [[:Category:OWASP Honeycomb Project|OWASP Honeycomb Project]].

Revision as of 03:03, 31 July 2006

Jul 31, 2006 - Fortify donates vulnerability research to OWASP

OWASP is pleased to announce the immediate free and open availability of an extensive classification of software security errors. The set of 115 vulnerabilities was researched by Dr. Brian Chess, Chief Scientist at Fortify Software and others. They were contributed to OWASP by Fortify Software Inc.

Fortifysoftware_lowres.JPG

OWASP will help manage the research as part of the new "Honeycomb" project, which is creating a comprehensive and integrated guide to the fundamental building blocks of application security, including principles, threats, vulnerabilities, attacks, and countermeasures.

The full set of vulnerabilities and the research that accompanies it is available in the OWASP Honeycomb Project.