23 May, 2022 When To Add Security To Your New Mobile App Business, Mobile App Authentication, Reverse Engineering, Mobile App Development Whether you are a brand new company bringing a mobile-centric digital service to market, or an...
18 May, 2022 What Are the Most Common Types of Mobile Man-in-the-Middle Attacks? API Keys, MitM Attack, Certificate Pinning, API Abuse A Man-in-the-Middle attack can come in multiple forms. This article describes these and how you can...
17 May, 2022 What Does Certificate Pinning Protect Against? Mobile App Development, MitM Attack, Certificate Pinning, API Abuse Certificate pinning is a security measure that mobile app developers can use to improve the...
19 April, 2022 What Is In-App Protection? Bots, Repackaged Apps, Reverse Engineering, Threats In-app protection refers to the security features built into mobile apps. These features help...
5 April, 2022 What is Mobile App Shielding? Repackaged Apps, Reverse Engineering, Threats, Mobile App Development As mobile devices become increasingly popular in the workplace, so do attacks targeting mobile...
9 March, 2022 Shielding APIs that Service Mobile Apps: Part 4 - When? Business, Threats, API Security, Mobile Security In the final part of this four part series, we’ll recommend what actions you should take and when...