Skip links

Mobile Security Resources

Reports, e-books, case studies, webinars and more to help you strategize and protect your organization on the mobile front.

More Resources

Mobile Penetration Testing: Episode III – Attack of the Code

In the third and final installment of our mobile penetration testing trilogy, we dive deep to find security flaws in mobile apps by dissecting the code with reverse-engineering and code analysis.

Mobile Penetration Testing Trilogy: Episode II – Return of the Back-end/Network

In the second episode of our mobile penetration testing trilogy, NowSecure Solutions Engineer Michael Krueger takes you beyond the device. Michael will explain how to perform network and web services/API testing to capture data exposed in transit between apps and backend services -- some of the highest risk security flaws around.

Mobile Penetration Testing Trilogy: Episode I – The Forensic Menace

Whether you’ve never performed mobile app penetration testing or need a refresher course, join us for an intensive tutorial explaining how to conduct penetration testing on Android and iOS apps. Director of Services Katie Strzempka will lead this accelerated instructional session. Katie has conducted mobile forensic investigations and app security assessments for almost a decade and leads the NowSecure team of expert penetration testers.

Mobile pitfalls to avoid: Breaking down the OWASP Top 10 Mobile Risks

Learn about the OWASP Mobile Top 10 Risks and how to apply this standard to building, testing, and deploying secure mobile apps.

Leaky Mobile Apps: Stemming the Flood of Private Data

The amount of data generated, stored and transmitted by mobile devices and apps is startling. Information leakage in mobile apps and devices exposes personal and corporate data that can be used for illicit purposes. IT security professionals need visibility into the risk introduced into the corporate environment by apps installed on employees’ dual-use devices. Mobile

Compliance in the mobile enterprise: Five tips to prepare for your next audit

State and federal regulations, such as the Health Information Portability and Accountability Act (HIPAA) and Sarbanes-Oxley (SOX), and industry standards, such as the PCI Data Security Standard (PCI DSS) and OWASP Top 10, have evolved as a result of mobile. So where do you start to achieve your compliance outcomes? Watch this webinar to find out.