Reports, e-books, case studies, webinars and more to help you strategize and protect your organization on the mobile front.
A free guide to identifying, evaluating, and deploying mobile app security testing solutions.
We present this report, gleaned from our database of mobile security intelligence, to help IT and security pros make informed decisions about managing and securing mobile devices, mobile apps, and their enterprises’ mobile ecosystem.
This guide includes over fifty best practices for creating more secure mobile applications. The descriptions of attacks and security recommendations in this report are not exhaustive or perfect, but you will get practical advice that you can use to make your app(s) more secure.
NowSecure CEO Andrew will explain five security enhancements in the Android and iOS platforms that present obstacles to defenders and incident responders, provide tips on overcoming those challenges, and share the open-source Mobile Triage toolset that facilitates the collection of mobile threat and vulnerability data.
In the third and final installment of our mobile penetration testing trilogy, we dive deep to find security flaws in mobile apps by dissecting the code with reverse-engineering and code analysis.
In the second episode of our mobile penetration testing trilogy, NowSecure Solutions Engineer Michael Krueger takes you beyond the device. Michael will explain how to perform network and web services/API testing to capture data exposed in transit between apps and backend services -- some of the highest risk security flaws around.
Whether you’ve never performed mobile app penetration testing or need a refresher course, join us for an intensive tutorial explaining how to conduct penetration testing on Android and iOS apps. Director of Services Katie Strzempka will lead this accelerated instructional session. Katie has conducted mobile forensic investigations and app security assessments for almost a decade and leads the NowSecure team of expert penetration testers.
Learn about the OWASP Mobile Top 10 Risks and how to apply this standard to building, testing, and deploying secure mobile apps.
The amount of data generated, stored and transmitted by mobile devices and apps is startling. Information leakage in mobile apps and devices exposes personal and corporate data that can be used for illicit purposes. IT security professionals need visibility into the risk introduced into the corporate environment by apps installed on employees’ dual-use devices. Mobile