Managers can find guidance for mobile app security verification and testing requirements from the OWASP Mobile Security Verification Standard (MASVS). We recommend using MASVS as a starting point for developing a plan of attack and standardizing testing using the Mobile AppSec Model. Learn more about it here.
NowSecure is proud to help sponsor DevOps World | Jenkins World on August 12 – 15. The San Francisco event brings brings together thought leaders and practitioners in the Jenkins ecosystem to learn, network with their peers and shape the future of Jenkins. To help plan your time at the conference, we suggest the following DevSecOps agenda to zero in on the intersection of DevOps and mobile appsec. Come see NowSecure at Booth 1129.
The NowSecure team is gearing up for an incredible week at Black Hat USA 2019 in Las Vegas. We’re excited to join the 22nd annual top security event to connect on all things mobile app security research, development, tools and trends.
To help you build your agenda and make the most of your time at the conference, we’ve selected several key Black Hat briefings that focus on mobile device security, enterprise mobile appsec, DevSecOps and reverse engineering. We look forward to connecting many of you with our mobile application security experts at the conference through prebooked meetings and visits to Booth #674.
Last week open-source software experts, mobile application DevSecOps leaders and practitioners and federal government specialists convened in Washington, D.C., at the first annual NowSecure Connect conference. The purpose of #Connect19 was to connect people, ideas, and technology by bringing together the top global technologists and industry thought leaders with a shared passion for delivering secure mobile apps at scale. At the end of the event, our goal was to ensure everyone walked away from the Kaiser Permanente Center for Total Health with new knowledge, insights and professional connections with peers.
While some organizations and executives may not be fully aware of all the threats to their mobile applications, the risks are real and growing. Vulnerabilities arise from code flaws, encryption errors, unsecured data transmission or data exposure. Looking back at the top five mobile breaches that have occurred over the past year helps drive home the importance of mobile application security.
Looking to build some mobile application security muscle? Staffing a strong team begins with identifying the right blend of skills and experience and pairing those people with appropriate tools and processes.