Articles by

Implications of TikTok ban on the future of mobile security

What does the TikTok ban mean for the future of mobile security? In this expert panel, cybersecurity leaders discuss the risks behind TikTok and other apps, the geopolitical concerns driving regulations, and the broader implications for mobile data privacy. Learn how organizations can protect sensitive data, manage mobile security risks, and navigate evolving regulatory landscapes. Stay informed—watch now!

Read More »

Emerging Tech Talk | Quokka at GITEC 2024

Explore the latest insights from GITEC 2024 in this eye-opening talk by Quokka. Discover the evolving threats in mobile security, from data-harvesting apps to hidden backdoors in supply chains. Learn how billions of devices are at risk and what steps organizations can take to mitigate security breaches. Get a deeper look at real-world examples of mobile threats and how app security intelligence can safeguard your data. Watch now!

Read More »

Defense in Depth: How MAST and Pen Testing Work Together

Enhance your mobile app security strategy with insights from this webinar on Defense in Depth with Trustwave. Learn how Mobile App Security Testing (MAST) and Penetration Testing complement each other to identify vulnerabilities, improve compliance, and strengthen defenses. Experts from Quokka and Trustwave share real-world examples, best practices, and strategies for integrating automated and manual testing to create a robust security posture. Watch now to secure your mobile applications!

Read More »

Protecting the Mobile Ecosystem: Risks & Security Measures

Mobile apps are more interconnected than ever, creating hidden security risks that users and businesses often overlook. In this deep-dive discussion, Ilya Dreytser explores the dangers of app collusion, where apps secretly share permissions, and unknown app risks that compromise user privacy and security. Learn how ad networks, SDK vulnerabilities, and permission mismanagement expose sensitive data—and what you can do to protect your device and mobile ecosystem. Watch now to secure your apps and data!

Read More »

CISA Secure by Design intro

The cybersecurity landscape is evolving, and CISAs “Secure by Design” initiative aims to shift the burden of security from users to technology manufacturers. In this webinar, Bob Lord, Senior Technical Advisor and Jack Cable, Senior Technical Advisor discuss the importance of integrating security at the design phase, eliminating vulnerabilities before they reach customers, and promoting transparency in software development. Learn how this approach can reduce cyber risks, protect businesses, and create safer digital ecosystems. Watch now!

Read More »

CISA’s Federal Enterprise Operations Cyber Alignment Plan

Ensuring a unified cybersecurity strategy across federal agencies is crucial. This report outlines CISA’s plan to enhance cyber resilience, streamline operations, and strengthen defenses against evolving threats. Learn how this initiative aligns federal cybersecurity efforts to protect critical infrastructure. Download now for key insights.

Read More »

Mobile security that makes you smile.

Sign up for our newsletter, The Quokka Intel Briefing

Copyright © 2025, Quokka. All rights reserved.