Dev sec blog

Dev Sec Blog

Mobile Security Basics

In this Mobile Security Basics blog series, we’ll share our mobile security research and cover general mobile app security industry information on attacks and threats against Android & iOS apps. This is very important information for app developers and cyber teams as they try to understand and defend against all the different exploits and attacks against their users, apps and mobile business.

We’ll also share DevOps CI/CD and Data-Driven DevSecOps™ best practices, and highlight key operational and industry insights, to help you achieve mobile DevSecOps agility and follow mobile app security best practices in CI/CD.

Subscribe today. we’d love to have you join our community!

Blog 15 Reasons For Securing A Telco Mobile App

Top 15 Reasons for Securing a Telco Mobile App

A 30-70% drop in traffic. That’s, according to one CEO, the impact the pandemic had on in-person visits to local branches. So how did telecommunication companies address this drop in branch traffic? They have aggressively expanded the use cases in their telco mobile app. Learn how to secure these mobile apps to protect the mobile consumer.

Read More »
Blog Best Practices For Mobile Devsecops V2.0 2

Best Practices for Mobile DevSecOps v2.0

RedHat defines DevSecOps as an approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle. Unfortunately, Mobile DevSecOps today is more an aspiration to…

Read More »
Blog Mobile App Compliance With Pci Requirements

PCI Compliance for Mobile Apps

Everything that accepts, processes, stores, or transmits credit card data must validate compliance with the PCI Data Security Standards (PCI-DSS). This means end users and developers of mobile applications…

Read More »
Blog 15 Reasons For Securing A Telco Mobile App

Top 15 Reasons for Securing a Telco Mobile App

A 30-70% drop in traffic. That’s, according to one CEO, the impact the pandemic had on in-person visits to local branches. So how did telecommunication companies address this drop in branch traffic? They have aggressively expanded the use cases in their telco mobile app. Learn how to secure these mobile apps to protect the mobile consumer.

Read More »
Blog Best Practices For Mobile Devsecops V2.0 2

Best Practices for Mobile DevSecOps v2.0

RedHat defines DevSecOps as an approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle. Unfortunately, Mobile DevSecOps today is more an aspiration to…

Read More »
Blog Mobile App Compliance With Pci Requirements

PCI Compliance for Mobile Apps

Everything that accepts, processes, stores, or transmits credit card data must validate compliance with the PCI Data Security Standards (PCI-DSS). This means end users and developers of mobile applications…

Read More »

Have a Security Project?

We Can Help!

ScottMaking your security project a success!
By filling out this form, you opt-in to recieve emails from us.

Stay up to date with the DevSecOps Evolution.

Subscribe to our Mobile DevSec Blogs