Daily Archives: September 4, 2014


Planning an effective cyber security strategy requires that you understand the vulnerabilities that exist within your IT environment and the ways cyber thieves can exploit them. The HP Security Cyber Risk Report 2013 provides industry-wide data on vulnerabilities in software, mobile, and web applications. Then it drills down to look at how specific technologies like iOS, Android, and JAVA contribute to the attack surface.

2013 Cyber Risk Report — Full Report


SAP is committed to providing customers with the highest quality software solutions. Static analysis is mandatory under the terms of SAP's Product Standard Security Requirements, and HP Fortify software is a key element in this program.

SAP Case Study