Reports, e-books, case studies, webinars and more to help you strategize and protect your organization on the mobile front.
This book will prepare enterprises and practitioners for the inevitable increase in mobile compromise. We will use step-by-step tutorials, guiding the reader from setting up a mobile IR practice all the way through continuous monitoring of mobile devices.
We present this report, gleaned from our database of mobile security intelligence, to help IT and security pros make informed decisions about managing and securing mobile devices, mobile apps, and their enterprises’ mobile ecosystem.
This guide includes over fifty best practices for creating more secure mobile applications. The descriptions of attacks and security recommendations in this report are not exhaustive or perfect, but you will get practical advice that you can use to make your app(s) more secure.
In the third and final installment of our mobile penetration testing trilogy, we dive deep to find security flaws in mobile apps by dissecting the code with reverse-engineering and code analysis.
In the second episode of our mobile penetration testing trilogy, NowSecure Solutions Engineer Michael Krueger takes you beyond the device. Michael will explain how to perform network and web services/API testing to capture data exposed in transit between apps and backend services -- some of the highest risk security flaws around.
Whether you’ve never performed mobile app penetration testing or need a refresher course, join us for an intensive tutorial explaining how to conduct penetration testing on Android and iOS apps. Director of Services Katie Strzempka will lead this accelerated instructional session. Katie has conducted mobile forensic investigations and app security assessments for almost a decade and leads the NowSecure team of expert penetration testers.
Learn about the OWASP Mobile Top 10 Risks and how to apply this standard to building, testing, and deploying secure mobile apps.
The amount of data generated, stored and transmitted by mobile devices and apps is startling. Information leakage in mobile apps and devices exposes personal and corporate data that can be used for illicit purposes. IT security professionals need visibility into the risk introduced into the corporate environment by apps installed on employees’ dual-use devices. Mobile
State and federal regulations, such as the Health Information Portability and Accountability Act (HIPAA) and Sarbanes-Oxley (SOX), and industry standards, such as the PCI Data Security Standard (PCI DSS) and OWASP Top 10, have evolved as a result of mobile. So where do you start to achieve your compliance outcomes? Watch this webinar to find out.