Can Your Mobile Security Strategy Hold Up in the Boardroom?
Mobile security strategy is now a routine part of boardroom discussions, and every CIO must be prepared to answer these types of questions. When you get called in to…
Our DevSec blog is dedicated to the topics, best practices and cybersecurity research needed by mobile developers (DEV) and cybersecurity (SEC) teams in the modern mobile DevOps pipeline.
In this DevSec blog we’ll share our research and best practices in securing Android & iOS apps. Our goal is to help mobile developers and cyber security teams stay ahead of mobile app hackers, attackers, pass mobile application penetration tests, and make mobile DevSecOps compliance easy.
Subscribe today. We’d love to have you join our community!
Mobile security strategy is now a routine part of boardroom discussions, and every CIO must be prepared to answer these types of questions. When you get called in to…
It’s a question being asked more and more lately: What are data brokers? The answer – in short – is that data brokers represent an emerging industry that trades in any…
A recent US appeals court ruling has set a new data protection precedent, giving the Federal Trade Commission (FTC) the power to hold companies responsible for data breaches resulting from security negligence.
Essentially,…
Apart from the billions of dollars that are at stake, data breaches can also spell the end of consumer trust and confidence in a brand. More often than not,…
The latest on the YiSpecter malware – a malicious code capable of infecting non-jailbroken iOS devices – presents an interesting dilemma. Not only does it conclusively dispel the notion that a…
Human error is cited as the leading cause of 52% of all security breaches and the new AndroidOS_Marchcaban.HBT Trojan may drive that number even higher via a phishing scheme targeting PayPal users and…
Last week’s discovery of the XcodeGhost is the first known example of compiler level malware on OS X. The malicious code that underlies XcodeGhost is cleverly designed to reach consumer data…
A shift has occurred in the cybercrime world, and it’s one that mobile app owners can’t afford to ignore. Recently, there’s been a sharp increase in app data theft…
When looking at the mobile security threat landscape, protection against fake Wi-Fi attacks stand out as being particularly important. As consumer demand for mobile data increases, app users connect to Wi-Fi…
How vulnerable, exactly, are Android phones to mobile app data theft? Based on recent research from mobile security expert Joshua Drake, 95% of Androids are potentially compromised by Stagefright, a media…
Steps To Prevent Mobile App Password Exposure
Developers should always try to prevent mobile app password exposure. But when they either use unencrypted text protocol, or incorrectly implemented HTTPS, Big…
Is your Enterprise Mobility Strategy BYOD ready?
While there was some early speculation that BYOD was more of a fad than a trend, the verdict is in and the debate…
Mobile security strategy is now a routine part of boardroom discussions, and every CIO must be prepared to answer these types of questions. When you get called in to…
It’s a question being asked more and more lately: What are data brokers? The answer – in short – is that data brokers represent an emerging industry that trades in any…
A recent US appeals court ruling has set a new data protection precedent, giving the Federal Trade Commission (FTC) the power to hold companies responsible for data breaches resulting from security negligence.
Essentially,…
Apart from the billions of dollars that are at stake, data breaches can also spell the end of consumer trust and confidence in a brand. More often than not,…
The latest on the YiSpecter malware – a malicious code capable of infecting non-jailbroken iOS devices – presents an interesting dilemma. Not only does it conclusively dispel the notion that a…
Human error is cited as the leading cause of 52% of all security breaches and the new AndroidOS_Marchcaban.HBT Trojan may drive that number even higher via a phishing scheme targeting PayPal users and…
Last week’s discovery of the XcodeGhost is the first known example of compiler level malware on OS X. The malicious code that underlies XcodeGhost is cleverly designed to reach consumer data…
A shift has occurred in the cybercrime world, and it’s one that mobile app owners can’t afford to ignore. Recently, there’s been a sharp increase in app data theft…
When looking at the mobile security threat landscape, protection against fake Wi-Fi attacks stand out as being particularly important. As consumer demand for mobile data increases, app users connect to Wi-Fi…
How vulnerable, exactly, are Android phones to mobile app data theft? Based on recent research from mobile security expert Joshua Drake, 95% of Androids are potentially compromised by Stagefright, a media…
Steps To Prevent Mobile App Password Exposure
Developers should always try to prevent mobile app password exposure. But when they either use unencrypted text protocol, or incorrectly implemented HTTPS, Big…
Is your Enterprise Mobility Strategy BYOD ready?
While there was some early speculation that BYOD was more of a fad than a trend, the verdict is in and the debate…
Have a Security Project?
We Can Help!