Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Blue Cedar

Below you will find reports with the source of “Blue Cedar”

image from Secure The App Not The Device

Secure The App Not The Device

This report seeks to help the reader understand why, “Security should accelerate mobile adoption, not prevent it.”
Added: October 25, 2018
image from Mobile App Security via Code Injection

Mobile App Security via Code Injection

This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. (more available)
Added: October 24, 2018
image from Mobile App Security Methods

Mobile App Security Methods

From The Report, “This article is third in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. (more available)
Added: October 23, 2018
image from Healthcare Apps In The BYOD World

Healthcare Apps In The BYOD World

This white paper reviews the current state of healthcare apps and device-centric mobile application management, then offers an improved, app-centric approach to mobile security. (more available)
Added: October 22, 2018
image from Future Vision For Secure Mobility

Future Vision For Secure Mobility

From The Report, “This article is fifth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. (more available)
Added: October 21, 2018
image from App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

This report seeks to clarify how app-centric security approaches can aid flexibility in a rapidly changing mobile world.
Added: October 13, 2018
© Cyentia Institute 2023
Library updated: February 8, 2023 20:08 UTC (build 051771c)