How to navigate between the trenches
Hybrid IT has moved from buzzword status to reality and organizations are realizing its potential impact. Some aspects of your infrastructure may remain in a traditional setting, while another part runs on cloud infrastructure—causing great complexity. So, what does this mean for you? “A Journey Through Hybrid IT and the Cloud” provides insight on:
Mobile applications are a rapidly growing attack surface. With a variety of tools and techniques available to threat actors, mobile application developers need to build a reliable security framework to address the most common security vulnerabilities. In this report, Guardsquare analyzed OWASP’s “Top 10” mobile security risks and mapped them to RASP and code hardening best practices.
The report also examines the Mobile Application Security Verification Standard (MASVS), also produced by OWASP, which details additional risks and resilience guidelines that complement the “Top 10.”
Key insights:● A developer-centric overview of OWASP’s “Top 10” & MASVS● How resilience layer controls can prevent reverse engineering and tampering● Security technique that protect against the OWASP’s “Top 10” mobile vulnerabilities● How to build a layered security approach
Download the full report to learn how you can leverage RASP and code hardening to defend your Android and iOS apps against the most common mobile app security threats.
Application hardening is an important part of mobile app security, and yet, it can feel like a difficult concept to grasp.
Developers often struggle to get hand-on knowledge and experience working with hardening techniques. In this technical magazine, Guardquare’s engineers have created a set of four fun, practical labs to help your organization familiarize itself with application hardening techniques and the security vulnerabilities that each technique thwarts. These four labs include:
• Code Checksumming• Control Flow (non-) Integrity in Android Applications• Native Library Encryption • Encrypting Objective-C Selectors
Developers will walk away from these labs with a greater understanding of the theory behind each technique, as well illustrations and guided examples to help them implement them in their own application security strategy.
Download the technical manual here and begin building a stronger security posture through application hardening.