Developed in partnership with vendors such as Amazon and Google, the ioXt Alliance has defined a new rigorous industry-wide certification standard for IoT vendors and developers to ensure security and privacy of IoT-connected mobile apps and VPNs. The new NowSecure ioXT Compliance Testing Solution empowers organizations to rapidly certify their IoT-connected mobile apps and mobile VPNs to comply with the ioXt Mobile Application Profile.
Given that Comscore reports mobile apps account for 69% of all digital traffic, it’s no surprise that mobile app developers and mobile DevSecOps professionals are in high demand. As mobile applications become increasingly critical to digital transformation, companies will pay a premium to attract mobile app developers and developers of all stripes.
The traditional layered security model of defending the perimeter no longer protects the enterprise. Today, leading organizations apply a Zero Trust model to mobile applications and devices. Discover five best practices for adopting Zero Trust to reduce risk from their mobile app portfolios.
Mobile application security researchers and pen testers alike rely on the Radare2 and Frida open-source tools for static analysis and code injection and are familiar with the R2frida plug-in that marries the two. A new OSS tool, ESILSolve, can simplify the process of reverse engineering complex mobile apps. Learn about the many benefits of ESILSolve and how to harness symbolic execution in this tutorial.
Did you know that the mobile app supply chain contains more than 6 million apps? The SolarWinds breach underscores the need to continuously monitor the supply chain for security, privacy and compliance risks. Protect your enterprise with continuous mobile app vetting and risk management.
U.S. federal agencies such as the Department of Defense have adopted mobile DevSecOps to unleash speed and innovation. But risks are plentiful and mobile app security issues have put service members in harm’s way or potentially compromised intelligence. Including security in the mobile app dev process and vetting software supply chain components enables federal agencies to achieve continuous security through automation.