Why Does Mobile Application Security Elude So Many Organizations?

Customer needs and demands often affect mobile application security. For this study, the Ponemon Institute surveyed 640 individuals involved in the application development and security process in their organizations on the
following topics:

  • Why mobile application security eludes many organizations.
  • The difficulty in controlling employees’ risky behaviors.
  • Are organizations taking the right steps to secure mobile apps?

As shown in Figure 1 from the report, 77 percent of respondents rate the level of difficulty in securing apps as very high. Only 7 percent of respondents believe it is easy or a “piece of cake.”

Furthermore, 65 percent of the respondents strongly agreed that the security of mobile apps is sometimes put at risk because of expanding customer demand or need. More specifically, the “rush to release” phenomenon challenges an organization’s ability to address the risks of data leakage and malware.

Read the full report to learn more about the complex challenges organizations face when trying to combat mobile security issues.

Read the Ponemon Study on the State of Mobile Application Insecurity

more from Endpoint

IOCs vs. IOAs — How to Effectively Leverage Indicators

Cybersecurity teams are consistently tasked to identify cybersecurity attacks, adversarial behavior, advanced persistent threats and the dreaded zero-day vulnerability. Through this endeavor, there is a common struggle for cybersecurity practitioners and operational teams to appropriately leverage indicators of compromise (IOCs) and indicators of attack (IOAs) for an effective monitoring, detection and response strategy. Inexperienced security […]

TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware

Malware authors use various techniques to obfuscate their code and protect against reverse engineering. Techniques such as control flow obfuscation using Obfuscator-LLVM and encryption are often observed in malware samples. This post describes a specific technique that involves what is known as metaprogramming, or more specifically template-based metaprogramming, with a particular focus on its implementation […]

Your browser doesn’t support HTML5 audio
Press play to continue listening
00:00 00:00