Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mobile App

Below you will find reports with the tag of “Mobile App”

image from Threat Advisory: iCare Leak

Threat Advisory: iCare Leak

This is a threat advisory for iCare Leak

Added: October 15, 2018
image from Mobile Integration Done Right

Mobile Integration Done Right

This paper takes a look at mobile app integration and presents how to do it correctly.

Added: October 14, 2018
image from Next-Gen Biometric Authentication

Next-Gen Biometric Authentication

Much helpful information about Biometric Authentication is revealed in this interview with InAuth Chief Strategy Officer Michael Lynch.

Added: October 14, 2018
image from The Mobile Device: The Center Of The Fraud Prevention Universe

The Mobile Device: The Center Of The Fraud Prevention Universe

From The Report, “A vision is emerging that balances effective fraud prevention with a delightful customer experience…The mobile device sits at the center of this vision. Properly secured, the mobile device can not only facilitate safer transactions within its own channel but can also be used to better secure other channels with minimal customer friction. This white paper will delve deeper into this vision and the roadmap for forward-thinking fraud executives."

(more available)
Added: October 14, 2018
image from Threat Advisory: flySAS mobile apps

Threat Advisory: flySAS mobile apps

This is a threat advisory for flySAS mobile apps

Added: October 14, 2018
image from Webroot Threat Report 2017

Webroot Threat Report 2017

The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users over the past year.

(more available)
Added: October 14, 2018
image from 2017 State Of Bug Bounty Report

2017 State Of Bug Bounty Report

This report mines that data and details to provide an inside look to the economics and emerging trends of managed bug bounty programs.

(more available)
Added: October 13, 2018
image from Android Security: 2015 Year In Review

Android Security: 2015 Year In Review

From the report, “We consider transparency to be critical, so our second annual Android Security Year in Review is intended to share the progress we’ve made with regards to security in the last year, as well as provide our view of the state of security in the Android ecosystem.”

(more available)
Added: October 13, 2018
image from App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

This report seeks to clarify how app-centric security approaches can aid flexibility in a rapidly changing mobile world.

Added: October 13, 2018
image from Choosing A Mobile App Integration Solution

Choosing A Mobile App Integration Solution

This paper seeks to aid the reader with choosing a mobile app integration solution.

Added: October 13, 2018
image from Duo Security's Two Factor Evaluation Guide

Duo Security's Two Factor Evaluation Guide

This guide provides comprehensive help for enterprises seeking to evaluate two factor authentication services.

Added: October 13, 2018
image from IBM X-Force Threat Intelligence Quarterly, 1Q 2015

IBM X-Force Threat Intelligence Quarterly, 1Q 2015

This paper provides a complete roundup of cyber incidents in 2014.

Added: October 13, 2018
  • ««
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)