Implications of TikTok ban on the future of mobile security

What does the TikTok ban mean for the future of mobile security? In this expert panel, cybersecurity leaders discuss the risks behind TikTok and other apps, the geopolitical concerns driving regulations, and the broader implications for mobile data privacy. Learn how organizations can protect sensitive data, manage mobile security risks, and navigate evolving regulatory landscapes. Stay informed—watch now!
Q-mast: Comprehensive Mobile App Security Testing

Ensure your mobile apps are secure before deployment. Q-mast delivers in-depth security assessments to detect vulnerabilities, misconfigurations, and compliance risks. Download now to see how it fortifies mobile applications.
Emerging Tech Talk | Quokka at GITEC 2024

Explore the latest insights from GITEC 2024 in this eye-opening talk by Quokka. Discover the evolving threats in mobile security, from data-harvesting apps to hidden backdoors in supply chains. Learn how billions of devices are at risk and what steps organizations can take to mitigate security breaches. Get a deeper look at real-world examples of mobile threats and how app security intelligence can safeguard your data. Watch now!
Android App Usage and Cell Tower Location: Privacy & Security Risks

Location data can reveal more than you think. This study analyzes Android app usage patterns and their relationship to cell tower locations, highlighting potential privacy concerns. Download now to learn more.
Defense in Depth: How MAST and Pen Testing Work Together

Enhance your mobile app security strategy with insights from this webinar on Defense in Depth with Trustwave. Learn how Mobile App Security Testing (MAST) and Penetration Testing complement each other to identify vulnerabilities, improve compliance, and strengthen defenses. Experts from Quokka and Trustwave share real-world examples, best practices, and strategies for integrating automated and manual testing to create a robust security posture. Watch now to secure your mobile applications!
Protecting the Mobile Ecosystem: Risks & Security Measures

Mobile apps are more interconnected than ever, creating hidden security risks that users and businesses often overlook. In this deep-dive discussion, Ilya Dreytser explores the dangers of app collusion, where apps secretly share permissions, and unknown app risks that compromise user privacy and security. Learn how ad networks, SDK vulnerabilities, and permission mismanagement expose sensitive data—and what you can do to protect your device and mobile ecosystem. Watch now to secure your apps and data!
CISA Secure by Design intro

The cybersecurity landscape is evolving, and CISAs “Secure by Design” initiative aims to shift the burden of security from users to technology manufacturers. In this webinar, Bob Lord, Senior Technical Advisor and Jack Cable, Senior Technical Advisor discuss the importance of integrating security at the design phase, eliminating vulnerabilities before they reach customers, and promoting transparency in software development. Learn how this approach can reduce cyber risks, protect businesses, and create safer digital ecosystems. Watch now!
CISA’s Federal Enterprise Operations Cyber Alignment Plan

Ensuring a unified cybersecurity strategy across federal agencies is crucial. This report outlines CISA’s plan to enhance cyber resilience, streamline operations, and strengthen defenses against evolving threats. Learn how this initiative aligns federal cybersecurity efforts to protect critical infrastructure. Download now for key insights.
Protecting The Mobile Ecosystem – Part 1

How can we truly protect the mobile ecosystem in an era of evolving threats? In this expert-led discussion, Quokka.io founder and Head of Sale, Simon, and Ilya Dreytser from Quokka delves into the complexities of mobile security—covering device vulnerabilities, app security, and user data protection. Learn how governments, businesses, and individuals can safeguard their data while navigating supply chain risks, BYOD policies, and regulatory challenges. Stay ahead of emerging mobile threats—watch now!