Posts about MAPS (7)

From Mobile Security Penetration Tester to Zimperium Employee

Zimperium
10 minutes
Jul 11, 2023
Read Zimperium's Georgia Weidman's journey from mobile security pen tester to Zimperium Security Architect & mobile security superhero.
Read Full Post

OWASP Mobile Top 10: Why OWASP Publishes A Separate List

OWASP
5 minutes
May 17, 2023
Learn why OWASP publishes a separate OWASP Mobile Top 10 list to address mobile’s fundamentally different characteristics, architectures, & threat vectors.
Read Full Post

Apple’s Move to Third-Party App Stores: How Developers Can Prepare

iOS & Android
5 minutes
Apr 28, 2023
As Apple prepares to open iOS to third-party app stores, learn how developers can ensure their apps meet Apple’s stringent security & privacy standards.
Read Full Post

Securing Medical Devices & Their Connected Digital Health Apps

Healthcare
4 minutes
Apr 04, 2023
Connected medical devices are in increasing demand. Learn how building secure FDA-compliant digital health apps is key to securing medical devices.
Read Full Post

A Comprehensive Guide to Mobile App Security

iOS & Android
8 minutes
Mar 24, 2023
Learn about the most common mobile app attack vectors, how to prioritize mobile app security objectives, and development lifecycle best practices.
Read Full Post

Taxed Not Hacked: Protect Sensitive Tax Data from Cybercrime

Phishing
6 minutes
Mar 23, 2023
Sensitive financial data is shared online during tax season. Learn how to protect confidential tax information from cybercrime this tax season.
Read Full Post

Zimperium Honored with Three Cybersecurity Excellence Awards

Zimperium
2 minutes
Mar 07, 2023
Read about Zimperium’s 2023 Gold Winner Cybersecurity Excellence Awards in Mobile Application Security, Mobile Security, & Mobile Threat Defense.
Read Full Post

Device Attestation: A Key Capability for SoftPOS and High-Security Apps

MPoC
6 minutes
Oct 20, 2022
Attestation and monitoring are a core component in meeting PCI MPoC standards. Learn how Zimperium helps meet the relevant security requirements defined in the MPoC standard while equipping SoftPOS developers with a flexible, highly configurable solution. Read more.
Read Full Post