Blogs by Pearce Erensel
Pearce Erensel
Global VP of Sales, Approov
Pearce’s cybersecurity experience stems from 7 years of securing mobile apps in highly regulated industries like banking, automotive, and medical device manufacturing. His client-focused approach has helped companies successfully tackle significant challenges in mobile app and API security. Pearce loves Approov's innovative, seamless, and adaptable approach, recognizing its potential to revolutionize mobile app security.
Posts on
- Mobile API Security (184)
- Mobile App Authentication (93)
- Mobile App Development (83)
- Mobile App Security (75)
- Mobile Security (74)
- Threats (70)
- API Abuse (64)
- Integration (55)
- API Keys (52)
- MitM (48)
- Bots (39)
- Business (38)
- Certificate Pinning (33)
- Reverse Engineering (31)
- Quickstart (25)
- Android Security (23)
- Backend (23)
- App Attestation (22)
- TLS (22)
- Repackaged Apps (20)
- Mobile Finance (17)
- Scrapers (17)
- iOS (17)
- Mobility (13)
- RASP (13)
- Mobile Health (12)
- Zero Trust (12)
- Gaming and Gambling (9)
- News (9)
- Run-time Secrets Protection (8)
- Third Party APIs (8)
- Fake Accounts (7)
- ReactNative (7)
- Retail (7)
- API Gateway (6)
- Account Hijacking (6)
- Apple (6)
- Compliance & Privacy (6)
- Huawei (6)
- Google (5)
- OAuth2 (5)
- Reverse Proxy (5)
- Code Obfuscation (4)
- OWASP (4)
- Aggregators (3)
- App Store (3)
- Cloud (3)
- Cross-Platform (3)
- Cybersecurity (3)
- Data Security (3)
- E-Commerce (3)
- Mobile App Distribution (3)
- SafetyNet (3)
- Token-Based API Access (3)
- Web Security (3)
- gRPC (3)
- Frontend (2)
- Mobile Banking (2)
- Mobile Payment Security (2)
- Pentesting (2)
- Runtime Application Self-Protection (2)
- SDLC (2)
- App Shielding (1)
- CNIL (1)
- Credential Stuffing (1)
- DeviceCheck (1)
- Frida (1)
- Google Play (1)
- Supply-chain (1)
Popular Posts
- How to Bypass Certificate Pinning with Frida on an Android App
- Revealing the Limitations of Apple DeviceCheck and Apple App Attest
- How to Extract an API Key from a Mobile App by Static Binary Analysis
- Limitations of Google Play Integrity API vs. Approov Mobile Security
- MitM Attacks on Android Apps: A Step-by-Step Guide Using Emulators
- Three Actions You Should Take Right Now to Stop Mobile MitM Attacks
- 5 Threats to Mobile Games and 5 Essential Security Measures
- Why Does Your Mobile App Need an API Key?
- Securing APIs with Approov and Cloudflare: A Comprehensive Guide
- Are You Human, Robot or Just Impatient?
- Limitations of Huawei HarmonyOS Safety Detect: What You Need to Know
- How to Ride the Bus for Free (Hackers Need Not Apply)
- Securing HTTPS with Certificate Pinning on Android
- Bypassing Certificate Pinning
- Epic Games Beat Google, but Lost to Apple - What are the Implications?
