By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Mobile application security best practices News
July 14, 2017
Google will use machine learning and automated peer review scans to improve Android app privacy and limit app permissions overreach.
May 26, 2017
End users are in the crosshairs of business data privacy issues, especially when it comes to information gleaned from artificial intelligence technologies.
May 19, 2017
News roundup: The new Google Play Protect system aims to improve Android app security. Plus, Google Cloud IoT Core adds layer of device security, and more.
Mobile application security best practices Get Started
Bring yourself up to speed with our introductory content
Ever since the first mobile device hit the enterprise network, best endpoint security practices have been a major IT concern. What's happened since then has been a staggering proliferation of the number and types of devices on the network, ... Continue Reading
Evaluate Mobile application security best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Securing Office 365 properly requires addressing upfront any specific risks of a particular environment and taking advantage of the many security controls Microsoft offers. Continue Reading
Online and application security is never perfect, but Office 365 security features come close. Here's an overview of how Microsoft installed security in its popular suite. Continue Reading
Office 365 security concerns should worry you but not dampen your enthusiasm for the platform's potential benefits for your business. Here's what you need to consider upfront. Continue Reading
Problem Solve Mobile application security best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Android for Work's sandboxing tools, which split work and personal profiles, can be bypassed with a proof-of-concept attack. Expert Michael Cobb explains how the attack works. Continue Reading
A researcher discovered 76 iOS apps containing sensitive user data that were vulnerable to man-in-the-middle attacks. Expert Michael Cobb explains how developers can prevent this. Continue Reading
Apple now restricts mobile app developers from using hot patching, as the technique can change app behavior after it is reviewed. Expert Kevin Beaver goes over enterprise concerns. Continue Reading