About the Author
Adam Cazzolla is a Sr. Security Consultant with HP Fortify on Demand.
Follow Us on Youtube
What You Need to Know About the Logjam Vulnerabil
- You're Invited to a Software Security Assurance Su...
s of an AppSec Program: Part 3--Key phas...
- The State of IoT Security (2015)
HP Security Strategist
s get down in the dirt when ...
- How secure are your web and mobile apps?
- I'm energized after my RSA booth duty!
- Announcing ShadowOS
When does it make sense to use applicatio
- WebInspect Enterprise 10.40 Release - available NO...
- CaroleLoomis on: The State of IoT Security (2015)
- on: Announcing ShadowOS
- TheAppDefender on: HP Cyber Risk Report 2015: spotlight on the applic...
IoT is the Frankenbea
st of Informatio n Security
Owning SQLi vulnerabil
ity with SQLmap
- on: Burp tips & tricks
n Security Testing – A journey from XSS ...
- on: Apple Pay, CurrentC, and Security
- on: HP Fortify Software Security Center and Static Cod...
- on: Personal Security: Things you must do to Protect Y...