Reports, e-books, case studies, webinars and more to help you strategize and protect your organization on the mobile front.
This guide includes over fifty best practices for creating more secure mobile applications. The descriptions of attacks and security recommendations in this report are not exhaustive or perfect, but you will get practical advice that you can use to make your app(s) more secure.
Whether you are starting from square one with a mobile app security initiative, have a bunch of adhoc tasks you want to consolidate into a repeatable process, or just want to make some tweaks to improve an existing program, this guide will help you take your mobile app security program to the next level.
To help financial institutions understand and overcome challenges in delivering secure mobile financial services, NowSecure collaborated with Accenture Consulting to study the state of security among iOS and Android mobile banking apps.
Fresh off the publication of her Mobile App Security Program Management Handbook, Katie Strzempka, VP Customer Success & Services, will share her experiences helping numerous enterprises design, build, and improve their mobile app security programs. Watch this webinar and take your mobile app security program to the next level.
Originally presented at the 5th Automotive Cyber Security Summit, NowSecure CEO and Co-founder Andrew Hoog presents on three topics:
NowSecure CEO and co-founder Andrew Hoog covers the fundamentals of information security for law firms. He addresses why companies should invest in cybersecurity and shares practical next steps to implement security best practices.
The keys to a mobile app security program are setting policy, educating developers, and choosing the right testing tools. Learn how one savvy engineer did it.
NowSecure CEO Andrew will explain five security enhancements in the Android and iOS platforms that present obstacles to defenders and incident responders, provide tips on overcoming those challenges, and share the open-source Mobile Triage toolset that facilitates the collection of mobile threat and vulnerability data.
In the third and final installment of our mobile penetration testing trilogy, we dive deep to find security flaws in mobile apps by dissecting the code with reverse-engineering and code analysis.