Training

Misplaced Trust in the Mobile Platform

Misplaced Trust in the Mobile Platform

The idea that smartphone apps can "put your business in the world's pocket" is driving the financial industry to rush to mobile applications. As a result, business elements that used to be physically secure are now being exposed to the general public. Couple that with a relatively young, chaotic mobile ecosystem, and you have a volatile business environment containing new and often hidden risks.

See Also: Key Drivers to Enable Digital Transformation in Financial Services

Attendees will gain thought-provoking insights and learn new techniques for securing their mobile applications, including:

  • Is iOS really as secure as the media has previously reported?
  • What are the security implications of implementing in HTML5 or Java?
  • What mobile security solutions align with the diverse threat vectors?
  • How self-defending software technology can bring strong, in-app security to platforms.

Background

Metaforic will host a mobile security webinar with an additional speaker from Forrester. The one-hour session will provide an overview of the latest mobile threats, and will discuss in detail the relative security merits of various mobile platforms (e.g, iOS, Android) and associated implementation approaches (e.g., HTML5, Objective-C, Java).

Recent surveys report that up to 79% of mobile malware exists on the Android platform, but even users restricted to the sanctity of Apple's walled garden, and further protected by in-application jailbreak detection, are no longer safe in the current threat environment. App providers who want their software to function correctly, even in imperfectly protected or hostile environments, need to avail themselves of the latest security techniques to prevent stolen accounts, fraudulent transactions, and other unwanted subversions.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.