Stop Bad Actors From Attacking Your Mobile Apps
Featuring
About This Webinar
Attackers will repackage mobile apps, inject malware, hooking frameworks, and perform overlay attacks to cause security breaches, data leaks, and gain privileged access. Once a mobile app is controlled or hijacked, attackers can attack your server-side applications using automated attacks. They will also steal sensitive data that resides in your mobile apps, such as customer credentials, API keys, and intellectual property. You are on the hook for rigorous compliance standards for privacy (ex: GDPR, CCPA), payments (ex: EMVCo SBMP, PCI, & PSD2), and health records (HIPAA).
Part of picking the right infrastructure is knowing you can extend secure experiences to mobile applications. With intellectual property and sensitive information flowing through these mobile apps, it’s important to understand the risk and what you can do to make this a safe channel for your business.
You’ll also learn more about F5’s new mobile app security solution which can help you reduce security risk and meet compliance. Join the conversation and see how mobile application security can be a bigger part of your secure application vision.
-
Host Jess Steinbach Webinar Moderator ActualTech Media
-
Featuring Peter Zavlaris Cyber Security Evangelist F5
-
Featuring Joshua Haslett Strategic Technology Partner Manager Google Cloud
What You'll Learn
- Better understand mobile app dependencies and hybrid architectures in the cloud
- Learn how to harden your mobile app against repackaging and runtime threats like hooking
- Learn about the compliance requirements for payments, privacy, and health
- Hear best practices for fending off those attackers and mitigating risk