
The App Security Gaps Created by BYOD
This guide offers practical advice on how to cost-effectively address the growing mobile security and privacy risks, without diminishing the benefits and convenience of BYOD (bring your own device).
This guide offers practical advice on how to cost-effectively address the growing mobile security and privacy risks, without diminishing the benefits and convenience of BYOD (bring your own device).
Leading cybersecurity solutions and consulting provider enlists Quokka for mobile app security intelligence to protect the public sector mobile ecosystem.
What does the TikTok ban mean for the future of mobile security? In this expert panel, cybersecurity leaders discuss the risks behind TikTok and other apps, the geopolitical concerns driving regulations, and the broader implications for mobile data privacy. Learn how organizations can protect sensitive data, manage mobile security risks, and navigate evolving regulatory landscapes. Stay informed—watch now!
Ensure your mobile apps are secure before deployment. Q-mast delivers in-depth security assessments to detect vulnerabilities, misconfigurations, and compliance risks. Download now to see how it fortifies mobile applications.
Explore the latest insights from GITEC 2024 in this eye-opening talk by Quokka. Discover the evolving threats in mobile security, from data-harvesting apps to hidden backdoors in supply chains. Learn how billions of devices are at risk and what steps organizations can take to mitigate security breaches. Get a deeper look at real-world examples of mobile threats and how app security intelligence can safeguard your data. Watch now!
Location data can reveal more than you think. This study analyzes Android app usage patterns and their relationship to cell tower locations, highlighting potential privacy concerns. Download now to learn more.
Enhance your mobile app security strategy with insights from this webinar on Defense in Depth with Trustwave. Learn how Mobile App Security Testing (MAST) and Penetration Testing complement each other to identify vulnerabilities, improve compliance, and strengthen defenses. Experts from Quokka and Trustwave share real-world examples, best practices, and strategies for integrating automated and manual testing to create a robust security posture. Watch now to secure your mobile applications!
Mobile apps are more interconnected than ever, creating hidden security risks that users and businesses often overlook. In this deep-dive discussion, Ilya Dreytser explores the dangers of app collusion, where apps secretly share permissions, and unknown app risks that compromise user privacy and security. Learn how ad networks, SDK vulnerabilities, and permission mismanagement expose sensitive data—and what you can do to protect your device and mobile ecosystem. Watch now to secure your apps and data!
The cybersecurity landscape is evolving, and CISAs “Secure by Design” initiative aims to shift the burden of security from users to technology manufacturers. In this webinar, Bob Lord, Senior Technical Advisor and Jack Cable, Senior Technical Advisor discuss the importance of integrating security at the design phase, eliminating vulnerabilities before they reach customers, and promoting transparency in software development. Learn how this approach can reduce cyber risks, protect businesses, and create safer digital ecosystems. Watch now!
Copyright © 2025, Quokka. All rights reserved.