Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Blue Cedar

Below you will find reports with the source of “Blue Cedar”

image from Secure The App Not The Device

Secure The App Not The Device

This report seeks to help the reader understand why, “Security should accelerate mobile adoption, not prevent it.”

Added: October 25, 2018
image from Mobile App Security via Code Injection

Mobile App Security via Code Injection

This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of how mobile app security can be achieved through the technique of code injection.

(more available)
Added: October 24, 2018
image from Mobile App Security Methods

Mobile App Security Methods

From The Report, “This article is third in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of various mobile app security methods including per-app VPN, containers, and micro-segmentation.”

(more available)
Added: October 23, 2018
image from Healthcare Apps In The BYOD World

Healthcare Apps In The BYOD World

This white paper reviews the current state of healthcare apps and device-centric mobile application management, then offers an improved, app-centric approach to mobile security.

(more available)
Added: October 22, 2018
image from Future Vision For Secure Mobility

Future Vision For Secure Mobility

From The Report, “This article is fifth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides a future vision for how mobile security is likely to evolve in the context of enterprise evolution.”

(more available)
Added: October 21, 2018
image from App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

This report seeks to clarify how app-centric security approaches can aid flexibility in a rapidly changing mobile world.

Added: October 13, 2018
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)