Dev sec blog

Dev Sec Blog

Welcome to Appdome’s DevSec Blog

Our DevSec blog is dedicated to the topics, best practices and cybersecurity research needed by mobile developers (DEV) and cybersecurity (SEC) teams in the modern mobile DevOps pipeline.

In this DevSec blog we’ll share our research and best practices in securing Android & iOS apps. Our goal is to help mobile developers and cyber security teams stay ahead of mobile app hackers, attackers, pass mobile application penetration tests, and make mobile DevSecOps compliance easy.

Subscribe today. We’d love to have you join our community!

Search
no-code codi compliance by appdome

Achieve CoDi Compliance without coding

CoDi Compliance, No coding required – The Fastest Way to Secure Mexico’s Mobile Banking Apps
What is CoDi?
CoDi is a digital/mobile payment system developed and sponsored by the Bank of…

Read More »
Appdome No Code Mobile Data at Rest Encryption

No-code Mobile Data-at-Rest Encryption

Mobile data-at-rest encryption isn’t a new concept for CIOs or CISOs of financial institutions, or of any other enterprise for that matter. Cybercriminals have been targeting data-at-rest with specially…

Read More »

Have a Security Project?

We Can Help!

GilWe're here to help
We'll get back to you in 24 hours to schedule your demo.

Stay up to date with the DevSecOps Evolution.

Subscribe to our Mobile DevSec Blogs

Search Appdome Solutions

Search
Blog Post Ciso 5.0

CISO 5.0 – Cyber as a Business Function

Cybersecurity has undergone a profound transformation over the past two decades. Once a narrowly scoped discipline focused on control and compliance, the Chief Information Security Officer (CISO) role has…

Blog Post Why Cyber Platforms Matter

Why Cyber Platforms Matter in Your AI Strategy

Palo Alto Networks and Crowdstrike have made it clear that platforms are the right strategy for cyber defense initiatives. And platforms do offer a lot of advantages over manual defense options – faster time to market, just-in-time defense, better compliance …

Blog Post White Box Cryptography Is A Sham

White-box Cryptography is a Sham

I’ve worked with our cyber research team, providing assessments of mobile apps for mobile banks and brands, and it always surprised me to see that API endpoints and API…