This page is part of a Security School lesson, featuring a selection of expert technical content on this topic. Explore more in this school:
7. - About the expert: Read more in this section
- Michael Cobb, Application Security
Explore other sections in this guide:
- 1. - What are malicious mobile apps, and what can IT do about them?
- 2. - The latest on malicious mobile apps
- 3. - Are malicious mobile apps just a mere inconvenience?
Michael Cobb, CISSP-ISSAP, is a renowned security author with over 20 years of experience in the IT industry. He has a passion for making IT security best practices easier to understand and achievable. His website www.hairyitdog.com offers free security posters to raise employee awareness of the importance of safeguarding company and client data and of following good practices. He co-authored the book IIS Security and has written many technical articles for leading IT publications. Mike has also been a Microsoft Certified Database Manager and registered consultant with the CESG Listed Advisor Scheme (CLAS).
Do you have a question for our experts?
Contributions from Michael Cobb, Application Security
- How to evaluate third-party application security
- Beating back malicious mobile apps
- Must-have vulnerability risk assessment tools
- Keeping touchscreen devices safe from mobile keyloggers
- First look: Microsoft EMET 5.0
- Crypto-currency and security: Is Bitcoin safe?
- How to get funding for rapid patch deployments
- In-house app store crucial part of mobile device security policy
- BYOD and mobile app data slurping
- How to augment XSS filtering
- How to defend your company against a mobile keylogger
- Microphones and speech-recognition security
- How Heartbleed changed open source software security
- Are rogue mobile apps a threat to Android?
- Windows Error Reporting: Helpful info or attacker fodder?
- How to test the security of cloud-based applications
- Countdown to Windows Server 2003 end of life planning
- If Obama can't have an iPhone, should anyone?
- Is malware on mobile devices more than an annoyance?
- Apple iOS security secrets revealed