Mobile and Web App Security: Mitigating Risks and Protecting APIs

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.


From mobile banking to eCommerce, consumers are relying on web and mobile apps more than ever before. However, as organizations become even more dependent on the revenue these apps generate, most still aren’t doing enough to protect applications and their underlying APIs against attacks that can compromise data or lead to fraud. 
 
Consumer web and mobile applications are particularly vulnerable to reverse engineering, and analyst research suggests most lack the protective capabilities and code hardening necessary to prevent apps from being compromised.
 
Relying on legacy security methods, such as network or perimeter protection, is not adequate to detect and prevent app attacks. 
 
In this webinar, a panel of experts will discuss:

  • How the growing app demand for API access is changing the security landscape
  • How to develop web and mobile applications with designed-in security to protect APIs
  • How to integrate application protection into existing DevOps processes

Speakers

Photo of Paul Dant

Paul Dant

Senior Security Engineer, Digital.ai

Photo of Thom Espach

Thom Espach

Application Security Consultant

Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.