Abstract When approaching the development of a mobile application, one of the key design decisions revolves around the server side aspect of the application. Specifically, storage of information relevant to the app’s usage, as well as the backend API’s allowing the app to query the server for information in real time (as opposed to static … Read More
Recently, the Office of the Australian Information Commissioner (OAIC) published its periodic statistical report on data breaches – occurring in Australia during the first half of 2020 – received under the Notifiable Data Breaches (NDB) scheme. According to the report, there was a three percent decrease in the number of data breaches reported to OAIC … Read More
Mobile devices and the apps operating on them expose your backend systems to cyberattacks. Attackers exploit vulnerabilities in mobile operating systems and in your apps to spy on your users, grab their private data, or even steal their money. In response, many mobile app developers are using app shielding, sometimes called “app hardening,” to protect … Read More
Several news outlets over the last few days are talking about how TikTok, the viral short video app where millions of teens post comedy skits set to music, is under fire from U.S. lawmakers. CNN reports US lawmakers on both sides of the aisle warn that the app could pose a national security risk, and … Read More
Our fourth webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” reviews Security Technology & Workflow Integrations, and took place on July 17, 2019. Mobile security exists at an intersection where mobile technology professionals and security professionals both have key roles. An enterprise mobile security solution … Read More