Fortify - Application Security
Recent statistics show that almost half of breaches that cause material damage occur via applications. HP Fortify provides software and services that help organization secure applications to prevent those attacks. This blog serves as a platform for our penetration testers, product managers and marketers, and software engineers to provide analysis and insight regarding both web application security and how organizations can utilize our products and services to better secure their applications. For more information, visit www.hp.com/go/fortify

Displaying articles for: December 2013

Creating a iOS7 Application Assessment Environment

iOS7-jailbreak.pngNow that you have your shiny new Evasion7 jailbreak running it's time to set up the environment for application testing!

Happy Holidays from the Fortify Security Team (and OddTodd).

OddTodd Holiday.pngOddTodd shares some of his most interesting gifts and the one he wished he got.

What Your Binary Says About You, Part 2: I'm Not Worried About Exploits!

When an attacker analyzes your binary, you don't want it to reveal a developer who throws caution to the wind!  In the second part of our series on iOS binary protections, we'll examine settings that detect and mitigate buffer overflow attacks.

WebInspect Demo Site Update

The web site used by the WebInspect product to demonstrate its functionality and effectiveness was significantly upgraded earlier this year.  The new version of Zero.webappsecurity.com was developed to allow WebInspect to showcase its enhanced capabilities against a website that more closely imitates the atmosphere of the modern web.

Insecure Data Storage – What your phone might be saying about you.

phone-password-300x199.jpgYou’ve picked up the latest greatest model of your favorite iPhone ™, Android ™  or Windows ™  phone with all of the latest features. You’ve set the screen lock with a good PIN (not 5555 like the last time). Now your data is secure and you have nothing to worry about, right?

Bitcoins, just one part of the new Hacker Economy - Part II

In Part I of this post, I discussed a number of common targets for today's cyber criminal: Bitcoins, mobile devices, credit cards and personal data. In this final post, I'll present a few more typical theft scenarios and finish by offering a few pointers you can use to minimize your chances of becoming an unwitting victim.

Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
  • Abhishek Rath is a Security Consultant with Fortify on Demand based out of New York City, New York. His areas of expertise are application security testing, risk management and building application security programs for the Global and Fortune 100. He can be reached at Abhishek.Rath@hp.com
  • Adam Cazzolla is a Sr. Security Consultant with HP Fortify on Demand.
  • http://www.danielmiessler.com/about
  • hacker, developer, script junkie [python,ruby,php]
  • Hacks for a living.
  • Jason Johnson is a Sr. Security Consultant with HP Fortify on Demand.
  • I have a passion for security and endeavor to participate in strong security defenses.
  • Lucas Gates is an Advanced Dynamic Tester with the Fortify On Demand team who enjoys responsible hacking.
  • US Army veteran. IT and infoSec professional since 1994. Founder of HouSecCon. aka m1a1vet
  • Rick Dunnam is an IS security professional with 15+ years experience in Enterprise Security and has consulted for many industry verticals: Banking, CPG, Healthcare, Government, Hospitality, and more
  • Sam Denard is a Senior Security Engineer with HP Enterprise Security.
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.