Learn why OWASP publishes a separate OWASP Mobile Top 10 list to address mobile’s fundamentally different characteristics, architectures, & threat vectors.
Learn why OWASP publishes a separate OWASP Mobile Top 10 list to address mobile’s fundamentally different characteristics, architectures, & threat vectors.
As Apple prepares to open iOS to third-party app stores, learn how developers can ensure their apps meet Apple’s stringent security & privacy standards.
Connected medical devices are in high demand, and their usage continues to grow. While these provide tremendous value, they also create a new attack surface that is susceptible to vulnerabilities and exploits. Find out how Zimperium’s Mobile Application Security Suite (MAPS) helps medical device companies build secure, FDA-compliant mobile applications.
These days developers are incentivized to build mobile app features faster than ever, which frequently leads to releasing vulnerable code. Mobile application security testing (MAST) tools are by far the most frequently used to find and fix vulnerable code, according to a recent survey we conducted of 270 security and […]
For years, healthcare has been going through a digital transformation, and in many organizations, the pandemic has radically accelerated this trend. Today, mobile devices play an increasingly central role in how patients access and experience healthcare services and how healthcare organizations manage operations and service delivery. We’re now well into […]
When it comes to securing your confidential data, encryption is universally acknowledged as a requirement, but it’s not a silver bullet for security. The Achilles Heel for encryption is the cryptographic key. Attackers are searching for these cryptographic keys as they permit access to the encrypted data. Basically, if you […]
Over the last few years, a major shift has occurred in how we use mobile devices and apps. Fundamentally, we continue to use our smartphones more and more. In the process, mobile apps continue to collect more sensitive personal and corporate data, while at the same time, mobile apps continue […]
When it comes to compliance, you’re never truly done. The environments you’re tasked with securing and auditing continue to evolve, and so do the standards and deadlines you have to meet. The EU’s Payment Service Directive 2 (PSD2) is a current case in point. The directive had several goals, including […]
LA Secure: Award-Winning Cybersecurity Bridges the Digital Divide The saying that “no good deed goes unpunished” often proves to be true. That’s why when good deeds actually get recognized and awarded, it is especially nice to see. It is within this context that we were delighted to hear the news […]
Mobile devices keep us tethered to the rest of the world. With the shift to remote work, schooling, banking, and healthcare, residents have become increasingly reliant on remote connectivity and mobile devices. Accessing digital services via mobile helps remove friction and improve residents’ quality of life. Whether at home, school, […]