Fortify - Application Security
Recent statistics show that almost half of breaches that cause material damage occur via applications. HP Fortify provides software and services that help organization secure applications to prevent those attacks. This blog serves as a platform for our penetration testers, product managers and marketers, and software engineers to provide analysis and insight regarding both web application security and how organizations can utilize our products and services to better secure their applications. For more information, visit

Displaying articles for: November 2013

What Your Binary Says About You, Part 1: Hello, My (User) Name Is…

120px-Hello_my_name_is_sticker.svg.pngIf you’ve ever run the “strings” command on an iOS binary, you know that quite a bit of information can be gleaned about an application just from the output of that one command.  In the first part of our series examining iOS binary protections in more detail, we'll look at a specific information disclosure vulnerability and the Xcode settings required to prevent it from occurring.

Tags: appsec| iOS| mobile| Xcode

Fortify on Demand Mobile releases the HP Mobile Application Security Vulnerability Report

HP Fortify on Demand Mobile examined more than 2,000 mobile applications from more than 600 companies to ascertain the true current state of mobile application security. The statistics reveal in alarming detail just how far mobile application security efforts need to grow to catch up to the pace of mobile application development and innovation. Read the full post for more information concerning these findings.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.