This page is part of a Security School lesson, featuring a selection of expert technical content on this topic. Explore more in this school:
7. - About the expert: Read more in this section
- Michael Cobb, Application Security
Explore other sections in this guide:
- 1. - What are malicious mobile apps, and what can IT do about them?
- 2. - The latest on malicious mobile apps
- 3. - Are malicious mobile apps just a mere inconvenience?
Michael Cobb, CISSP-ISSAP, is a renowned security author with over 20 years of experience in the IT industry. He has a passion for making IT security best practices easier to understand and achievable. His website www.hairyitdog.com offers free security posters to raise employee awareness of the importance of safeguarding company and client data and of following good practices. He co-authored the book IIS Security and has written many technical articles for leading IT publications. Mike has also been a Microsoft Certified Database Manager and registered consultant with the CESG Listed Advisor Scheme (CLAS).
Do you have a question for our experts?
Contributions from Michael Cobb, Application Security
- Does digital watermarking improve data security?
- Are 'self-defending' app security products effective?
- Open source Java frameworks: How big is the risk?
- How to reduce the risk of Flash security issues
- Is Firefox PDF reader a secure alternative to Adobe Rea
- What is OCSP?
- The risks of running Android apps on BlackBerry 10
- Quiz: Database security issues
- How to harden legacy applications with Microsoft's EMET
- Analysis: How BlackBerry 10's password blacklist works
- Google Play Private Channel: Better than app stores?
- How to mitigate Adobe Shockwave Player security issues
- How to prevent the top five most common Web app flaws
- Validating Web app security: Pen test or code review?
- The evolution of threat detection and management
- Flash marries Patch Tuesday: How to adjust patching
- Is security an issue for the Ruby on Rails framework?
- Should enterprises steer clear of Dropbox?
- Should password policies cover users' third-party apps?
- NoSQL security vs. RDBMS security