• Overview 
  • About yourself 
  • Download

Know the big three

This white paper takes a look at the three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk. (249 KB)
image | 4aa4-4446enw
PDF 249 KB
4 pages
Overview

Mobile computing is growing at an exponential rate, and vulnerabilities that can be exploited are growing. The mobile security of mission-critical data is becoming a serious concern.

In this paper, learn:

  • Why mobile applications are just as prone to security vulnerabilities as their web counterpart
  • How the insecure use of mobile APIs, data exposure in transit and at rest, and other serious threats make this shift to mobile computing an important issue for businesses today
  • The top three mobile application security threats
  • Recommendations on how to mitigate the risk from mobile computing security vulnerabilities
Table of contents
The risks of mobile applications
2
Sensitive data leakage over insecure channels
3
Lost/Stolen devices
3
Malicious applications
4
Recommendations
4