27 May, 2022 How to Prevent API Abuse API Keys, Fake Accounts, Mobile App Authentication, Repackaged Apps API abuse, when the API is used in an unexpected way, is a growing problem in software development...
26 May, 2022 How Can I Protect My Mobile API? Mobile App Authentication, Bots, Reverse Engineering, Mobile App Development As any mobile developer knows, APIs are the foundation of any mobile app strategy. They allow...
23 May, 2022 When To Add Security To Your New Mobile App Business, Mobile App Authentication, Reverse Engineering, Mobile App Development Whether you are a brand new company bringing a mobile-centric digital service to market, or an...
12 May, 2022 The Risks & Rewards of Travel by Mobile API Keys, Business, Mobile App Authentication, Mobile App Development After a couple of false starts, we are finally emerging from behind the shadow of the Covid...
10 April, 2022 How Do You Make a Mobile App Secure? Mobile App Authentication, Mobile App Security Mobile apps are an integral part of our lives, but all too often, they're not secure. Over the...
22 February, 2022 Shielding APIs that Service Mobile Apps: Part 3 - How? Mobile App Authentication, Bots, Reverse Engineering, Threats In the third part of this article series, we will look at the component parts of a shielding...