Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mobile

How to Apply the NIST Framework to Your Mobile Security Strategy

If mobile devices aren’t a high priority in your security posture, they should be. About two-thirds of employers consider smartphones “critical to agility and speed of decision-making,” and some would even consider phasing out PCs entirely. As a starting point, consider using the National Institute of Standards and Technology (NIST) cybersecurity framework. This set of guidelines from the U.S.

Best Static Analysis Tools for Mobile App Security

Before the introduction of static code analysis tools, securing mobile applications often felt like playing catch-up. Development teams would spend months building features, only to discover critical vulnerabilities late in the release cycle. This last-minute scramble to fix security issues delayed product launches and stretched resources thin—adding more pressure on developers and security teams.

Introducing Passphrase Capabilities on Android

To generate a passphrase for a new or existing record on Android, tap the dice icon, select the dropdown menu next to “Type” and select Passphrase. You can customize your passphrase by setting the length, including capitals and numbers in the passphrase, and choosing from various symbols to separate the words. Passphrases can be up to 20 words long, with a minimum length of 5 words and each word including at least 3 characters. Check the box if you'd like to make your selections the default setting for all passphrases moving forward. Tap Use Passphrase or Copy Passphrase when you are done.

How Generative AI is Transforming Application Security

Application security has transformed from being an afterthought to a central focus as threats have evolved. What was once about securing code has expanded to protecting the entire application lifecycle. The rise of cloud-native architectures, microservices, and APIs has broadened the attack surface, requiring security teams to rethink their approaches.

Mobile Optimization: Why It's Important for SEO Rankings

Is your website falling behind because it is not mobile-friendly? With mobile searches outpacing computer-based ones, search engines prefer sites that work seamlessly on phones and tablets. If your site is not easy to use on all devices, visitors leave - so does your ranking. Mobile optimization is a must-have strategy for increasing chances of better visibility, engagement, and more conversions. In this blog, we'll show you why mobile optimization is key to climbing the SEO ranks and staying ahead of the competition. Ready to boost your success? Let's get started!

How to Use a Risk-Based Vulnerability Management Model to Secure Mobile Dev

The typical workplace of the information age is no longer an office cubicle with a desktop PC. It’s an airplane seat, a comfy cafe chair, and a kitchen table — and it may not even have a company-issued device at its center. Research shows the productivity gains made possible by the growth of bring-your-own-device (BYOD) policies. Yet empowering employees to do their best work wherever they are and with whatever devices they have at their disposal also comes with risks.

Cyber Attackers are Adopting a "Mobile First" Attack Strategy

With 16+ billion mobile devices in use worldwide, new data sheds light on how cyber attackers are shifting focus and tactics to put attacks into the victim’s hands. There’s an interesting story woven throughout mobile security provider Zimperium’s 2024 Global Mobile Threat Report that demands the attention of organizations intent on securing every attack vector – which includes personal mobile devices.

Best Penetration Testing Tools for Enterprises

Penetration testing tools are necessary for enterprises that want to protect their applications from real-world cyber attacks. These tools identify vulnerabilities that could lead to breaches, like the 2017 Equifax data breach. These specialized tools help identify gaps in software security posture by simulating real-world attacks that vulnerability assessments may not fully expose.

See Falcon for Mobile in Action

As mobile devices become vital to daily operations, adversaries target them as entry points into organizations. Traditional security solutions fall short in combating the rising risks posed by mobile threats. With 51% of organizations experiencing mobile app-related incidents and 64% facing significant risk from mobile devices, it's time to secure these endpoints with Falcon for Mobile, which delivers advanced threat detection and protection for both Android and iOS devices.