Request Demo
Contact Us
Request Demo
Contact Us
Read More
Contents
Filters
No results match the search/filter criteria
Zero Trust Architecture: Mobile Application and Device Security for Federal Agencies
Q-vet Solution Brief
Addressing the OWASP Mobile Top 10 2024 Requirements
Automating NIAP Requirements Testing for Mobile Apps
Mobile App Security and Privacy Transformational Assessment and Validation (NHS Apps Library)
NIST Special Publication 1800-22
Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software
Q-Scout Solution Brief | Personal Device Management (BYOD)
What Is Vulnerability Management?
Q-Scout 101 | The Next Revolution in BYOD & Mobile Security
The Spread of ByteDance Code Beyond the TikTok App
Defense in Depth: How MAST and Pen Testing Work Together
Q-mast Solution Brief
DHS Automated Vetting Process for Mobile Apps Could Cut Costs
Quokka Overview
Q-mast for Federal Agencies
What's Really Going on with TikTok? And What’s all the Fuss About?
Healthcare Hacking & Protecting mHealth Apps
What Is Mobile Security? And Why Is Mobile App Security Testing Important?
DevSecOps Adoption for Federal Agencies
Is Banning TikTok the Right Approach or Are We Ignoring the Real Problem?
NIST Special Publication 1800-21
Looking Forward to 2024 & Reviewing Top Mobile Security & Privacy Trends in 2023
CISA Secure by Design intro
Q-mast for Banking
TikTok’s Rise in Popularity and the Security Risks That Could Lead to Nationwide Bans
Is Banning TikTok the Right Approach or Are We Ignoring the Real Problem?
Michael Duffy on CISA’s Federal Enterprise Operations Cyber Alignment Plan
OIG Management Alert - ICE Management and Oversight of Mobile Applications
The App Security Gaps Created by BYOD & the 4 Steps to Address Them
A New Directive Aims to Safeguard Federal Information: BOD 23-01
What Are Supply Chain Attacks? And Why Should I Care?
Protecting The Mobile Ecosystem - Part 2
Q-Scout Solution Brief | App Intelligence
Q-mast Sample Report
Is Your Mobile App Supply Chain Putting Your Organization at Risk?
NIST Special Publication 800-163
TikTok Deep Dive: The Numbers Speak for Themselves
NIAP v1.4 Protection Profile for Application Software
Mobile Application Security Best Practices for Fintech Apps
Protecting The Mobile Ecosystem - Part 1
Q-mast for Medical Schools
Safeguarding Federal Agency Mobile Applications and Devices
Thumbnails
Document Outline
Attachments
Layers
Current Outline Item
Previous
Next
Highlight All
Match Case
Match Diacritics
Whole Words
Color
Size
Color
Thickness
Opacity
Presentation Mode
Open
Print
Download
Current View
Go to First Page
Go to Last Page
Rotate Clockwise
Rotate Counterclockwise
Text Selection Tool
Hand Tool
Page Scrolling
Vertical Scrolling
Horizontal Scrolling
Wrapped Scrolling
No Spreads
Odd Spreads
Even Spreads
Document Properties…
Toggle Sidebar
Find
Previous
Next
Presentation Mode
Open
Print
Download
Current View
FreeText Annotation
Ink Annotation
Tools
Zoom Out
Zoom In
Automatic Zoom
Actual Size
Page Fit
Page Width
50%
75%
100%
125%
150%
200%
300%
400%
More Information
Less Information
Close
Enter the password to open this PDF file:
Cancel
OK
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Page Size:
-
Fast Web View:
-
Close
Preparing document for printing…
0%
Cancel
Share your details
to get mobile security insights relevant to you