Skip to main content

Security and usability are not mutually exclusive in mobile applications

Organizations that build or maintain mobile applications have a greater responsibility than ever to secure their applications as the number of application downloads continues to grow. 

3.8 billion smartphone users accounted for 218 billion app downloads in 2020 alone.

Zimperium conducted a survey last year in which 250 enterprises described the security issues they  struggled with the most within their their mobile applications.

The greatest security issue with applications for Android was lacking runtime protection at 93% while this data point was at 79% for iOS. Where iOS struggles was in lacking code protection at 94% while it is only 63% on Android.

The two other most common issues were vulnerable encryption for which both application types hovered around 50%, while the lack of data protection sat at around 26-38% for both device types. 

The survey found that enterprises were concerned with the right things, such as ensuring data is securely stored and transmitted and ensuring proprietary source code cannot be stolen, but the fixes for these concerns were not being focused on enough, Krishna Vishnubhotla, VP of product strategy at Zimperium, said during a recent SD Times Live!  webinar “Top Five Best Practices for Mobile DevSecOps.” 

The reason is a lot of the companies fear that implementing security solutions can make the user experience suffer and slow up development or make it difficult to use. However, this can be mitigated by asking questions from the vendor to see whether the challenges or concerns can be minimized or removed. 

“People tend to look at mobile and they think it’s a contained environment. There’s this feeling of it being a little bit more secure than your desktops,” said Adam Wosotowsky, principal data architect at Zimperium. ”It really surprised me just how not true that is. From a security perspective, they have existing security wrapped around their app, and therefore they think they don’t have to worry about it quite as much. But the problem is all of that security can be pretty easily bypassed.” 

To bolster security organizations should be looking to:

  1. Ensure security still works when an attacker controls the device
  2. Limit the pool of people who can successfully hack your app
  3. Never let your encryption keys appear in plain text
  4. You need threat visibility once you publish the app
  5. Think like a hacker – Apps are windows into your infrastructure

To learn more, watch the SD Times Live!  webinar “Top Five Best Practices for Mobile DevSecOps.” 

The post Security and usability are not mutually exclusive in mobile applications appeared first on SD Times.



from SD Times https://ift.tt/9tMZ4hc

Comments

Popular posts from this blog

Difference between Web Designer and Web Developer Neeraj Mishra The Crazy Programmer

Have you ever wondered about the distinctions between web developers’ and web designers’ duties and obligations? You’re not alone! Many people have trouble distinguishing between these two. Although they collaborate to publish new websites on the internet, web developers and web designers play very different roles. To put these job possibilities into perspective, consider the construction of a house. To create a vision for the house, including the visual components, the space planning and layout, the materials, and the overall appearance and sense of the space, you need an architect. That said, to translate an idea into a building, you need construction professionals to take those architectural drawings and put them into practice. Image Source In a similar vein, web development and design work together to create websites. Let’s examine the major responsibilities and distinctions between web developers and web designers. Let’s get going, shall we? What Does a Web Designer Do?

A guide to data integration tools

CData Software is a leader in data access and connectivity solutions. It specializes in the development of data drivers and data access technologies for real-time access to online or on-premise applications, databases and web APIs. The company is focused on bringing data connectivity capabilities natively into tools organizations already use. It also features ETL/ELT solutions, enterprise connectors, and data visualization. Matillion ’s data transformation software empowers customers to extract data from a wide number of sources, load it into their chosen cloud data warehouse (CDW) and transform that data from its siloed source state, into analytics-ready insights – prepared for advanced analytics, machine learning, and artificial intelligence use cases. Only Matillion is purpose-built for Snowflake, Amazon Redshift, Google BigQuery, and Microsoft Azure, enabling businesses to achieve new levels of simplicity, speed, scale, and savings. Trusted by companies of all sizes to meet

2022: The year of hybrid work

Remote work was once considered a luxury to many, but in 2020, it became a necessity for a large portion of the workforce, as the scary and unknown COVID-19 virus sickened and even took the lives of so many people around the world.  Some workers were able to thrive in a remote setting, while others felt isolated and struggled to keep up a balance between their work and home lives. Last year saw the availability of life-saving vaccines, so companies were able to start having the conversation about what to do next. Should they keep everyone remote? Should they go back to working in the office full time? Or should they do something in between? Enter hybrid work, which offers a mix of the two. A Fall 2021 study conducted by Google revealed that over 75% of survey respondents expect hybrid work to become a standard practice within their organization within the next three years.  Thus, two years after the world abruptly shifted to widespread adoption of remote work, we are declaring 20