Fortify - Application Security
Recent statistics show that almost half of breaches that cause material damage occur via applications. HP Fortify provides software and services that help organization secure applications to prevent those attacks. This blog serves as a platform for our penetration testers, product managers and marketers, and software engineers to provide analysis and insight regarding both web application security and how organizations can utilize our products and services to better secure their applications. For more information, visit

Displaying articles for: October 2013

How Scary is Cyber Crime?

It's the season for ghosts and goblins, monsters and zombies. But there is nothing quite as scary as Cyber Crime!

Tags: cyber crime

Join HP at AppSec USA 2013 in NYC, November 18-21

As you know, Software Security has never been more important and 2014 will be a pivotal year.
Please join us at AppSec USA 2013, November 18-21 at the New York Marriott Marquis.

Know Your Limits

Clearly defining an application is essential to evaluating its security status.  For security testing purposes, “defining” means drawing a clear line between that which is to be tested and that which is not.  Doing this is not as easy as you might like; especially when you consider the application’s place within an organization.  Let’s talk about an approach to this problem.

HP provides application security for the LDS Church

See how one organization solved their application security challenges using HP Fortify solutions.

Tags: Fortify

The Mobile Secure Un-Development Life Cycle

Developing apps for the mobile platform has more twists and turns than anyone would possibly want.   Some of these challenges are out of your control which makes the Mobile SDLC difficult to manage.




Finding Inspiration on Ada Lovelace Day

377px-Ada_Lovelace-small.jpgToday is the fifth annual Ada Lovelace Day, a worldwide celebration of women in science, technology, engineering, and math (STEM).  To celebrate, we're profiling three hackers and researchers who are doing great things in tech.

Low Risk Mobile Vulnerabilities Can Lead to High Risk Exposure pt. 1

data-leakage-253x300.jpgWhen we deliver results to customers on mobile assessments there is always a bit of a learning curve pertaining to risk levels assigned to certain findings. In most cases, by themselves, low risk vulnerabilities can be non-issues. This is true for appsec vulns or mobile vulns. In reality some companies do not even fix them.



In part one of this blog I’ll go over a few that have presented interesting and high yield results. Hopefully this will remind people that combinations of these vulns (or bad applications of them) can be just as critical as any High risk finding on an assessment. We will use iOS examples below.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.