Dev sec blog

Dev Sec Blog

Welcome to Appdome’s DevSec Blog

Our DevSec blog is dedicated to the topics, best practices and cybersecurity research needed by mobile developers (DEV) and cybersecurity (SEC) teams in the modern mobile DevOps pipeline.

In this DevSec blog we’ll share our research and best practices in securing Android & iOS apps. Our goal is to help mobile developers and cyber security teams stay ahead of mobile app hackers, attackers, pass mobile application penetration tests, and make mobile DevSecOps compliance easy.

Subscribe today. We’d love to have you join our community!

Search
Blog End Of The Enterprise Vpn

The End of the Mobile Enterprise VPN

The nature of work in the modern enterprise has become overwhelmingly mobile, fluid and diverse. Today’s workforce is remote, mobile-first and requires secure anytime, anywhere mobile apps, with direct…

Read More »
Blog 15 Reasons For Securing A Telco Mobile App

Top 15 Reasons for Securing a Telco Mobile App

A 30-70% drop in traffic. That’s, according to one CEO, the impact the pandemic had on in-person visits to local branches. So how did telecommunication companies address this drop in branch traffic? They have aggressively expanded the use cases in their telco mobile app. Learn how to secure these mobile apps to protect the mobile consumer.

Read More »
Blog End Of The Enterprise Vpn

The End of the Mobile Enterprise VPN

The nature of work in the modern enterprise has become overwhelmingly mobile, fluid and diverse. Today’s workforce is remote, mobile-first and requires secure anytime, anywhere mobile apps, with direct…

Read More »
Blog 15 Reasons For Securing A Telco Mobile App

Top 15 Reasons for Securing a Telco Mobile App

A 30-70% drop in traffic. That’s, according to one CEO, the impact the pandemic had on in-person visits to local branches. So how did telecommunication companies address this drop in branch traffic? They have aggressively expanded the use cases in their telco mobile app. Learn how to secure these mobile apps to protect the mobile consumer.

Read More »

Have a Security Project?

We Can Help!

AlanWe're here to help
We'll get back to you in 24 hours to schedule your demo.

Stay up to date with the DevSecOps Evolution.

Subscribe to our Mobile DevSec Blogs

Search Appdome Solutions

Search
Blog Top 3 Ways Screen Overlay Attacks Are Used for Mobile Fraud

How Attackers Use Overlay Attacks to Commit Mobile Fraud

A Screen Overlay Attack (sometimes also called Clickjacking) is an attack method whereby bad actors and fraudsters uses multiple transparent or opaque layers to trick a user into clicking on a button…