Addressing the OWASP Mobile Top 10 2024 Requirements
Today, there are a range of risks that expose mobile applications—and the personal and corporate data these apps access. As mobile apps become more sophisticated,
Today, there are a range of risks that expose mobile applications—and the personal and corporate data these apps access. As mobile apps become more sophisticated,
In an era where digital transformation has accelerated the pace at which applications are developed, deployed, and consumed, the critical significance of application security has
Many mobile applications are built to connect users directly to a company’s goods or services. Often, apps are developed to take a process that was
A conversation with Steve Schofield, Full-Time AppSec Developer and Part-Time Adjunct Teacher, and Ilya Dreytser, Head of Sales and Customer Engineering at Quokka Navigating through
On a panel during Singapore International Cyber Week, industry experts representing Samsung Electronics, Google, Quokka, OWASP, and DEKRA discussed how to combat the challenges of mobile scams and threats.
In this blog, we will delve into two crucial components of defense in depth: Mobile Application Security Testing (MAST) and Runtime Application Self-Protection (RASP).
In this blog, we share an overview of the security holes we found in pre-installed software on prepaid Android carrier smartphones.
Mobile app extensions are allowing developers to create advanced user experiences globally. As complexity grows, so does the importance of prioritizing security and data privacy.
In an age where employees are increasingly mobile and digital technologies have become ubiquitous in the workplace, companies must make sure they have secure systems for protecting their data, applications and communication networks.
Copyright © 2024, Quokka. All rights reserved.