Best Practices

The Analyst’s Guide to MiTM Issues in Mobile Apps

The Analyst’s Guide to MiTM Issues in Mobile Apps The most common questions I get from mobile application security analysts…

Read More »

Unlocking Mobile App Vulnerabilities in Hotel Room Keys

Unlocking Mobile App Vulnerabilities in Hotel Room Keys To improve the guest experience and keep pace with competition, hotels worldwide…

Read More »

5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile

5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile Both static and dynamic security testing are essential components of…

Read More »

Insider Threats Are Rising – But They Shouldn’t Be

Simply implementing best practices is not enough to address the risk coming from your own employees. . Insider Threats Are…

Read More »

AppSec Threat Modeling: How to Map Your Mobile App Portfolio to OWASP MASVS

AppSec Threat Modeling: How to Map Your Mobile App Portfolio to OWASP MASVS Whenever I talk with customers at conferences…

Read More »

Best Practices for Mobile App Pen Testing

Best Practices for Mobile App Pen Testing The art of mobile app pen testing can sometimes feel like digging a…

Read More »

How to Staff a Strong Mobile AppSec Team

How to Staff a Strong Mobile AppSec Team Mobile app developers work at a fervent pace to push out release…

Read More »

Peering Inside the Mobile Attack Surface

Peering Inside the Mobile Attack Surface Application security managers are keenly aware of an abundance of mobile threats that can…

Read More »

How to Protect Mobile Apps from MiTM Attacks

How to Protect Mobile Apps from MiTM Attacks Nearly all mobile apps interact with backend systems and require secure communications.…

Read More »
Back to top button
Close