Hi [[ session.user.profile.firstName ]]

Arxan Technologies

  • Date
  • Rating
  • Views
  • The Vulnerability Epidemic in Mobile Financial Apps
    The Vulnerability Epidemic in Mobile Financial Apps
    Aaron Lint, Arxan chief scientist | Alissa Knight, Aite Group senior cybersecurity analyst Recorded: Apr 24 2019 47 mins
    What’s standing between many mobile apps and an epic breach? According to new research, about 8.5 minutes.

    A study conducted by global research and advisory firm Aite Group examined the protective capabilities of 30 different financial services applications found on the Google Play store. Using commonly available software tools, study author and Aite senior cybersecurity analyst Alissa Knight discovered nearly all of the apps could be easily reverse engineered – in less than nine minutes on average – exposing sensitive information such as personally identifiable information, account credentials, intellectual property, QA/test and production API urls, private certificates, and API keys/locations.

    In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection. You’ll learn:
    -Common app vulnerabilities and the sensitive information they can reveal
    -Top development mistakes that lead to data exposure
    -Strategies for implementing app protection into the software development lifecycle
  • The Vulnerability Epidemic in Mobile Financial Apps
    The Vulnerability Epidemic in Mobile Financial Apps
    Aaron Lint, Arxan chief scientist | Alissa Knight, Aite Group senior cybersecurity analyst Recorded: Apr 23 2019 45 mins
    What’s standing between many mobile apps and an epic breach? According to new research, about 8.5 minutes.

    A study conducted by global research and advisory firm Aite Group examined the protective capabilities of more than 30 different financial services applications found on the Google Play store. Using commonly available software tools, study author and Aite senior cybersecurity analyst Alissa Knight discovered nearly all of the apps could be easily reverse engineered – in less than nine minutes on average – exposing sensitive information such as personally identifiable information, account credentials, intellectual property, QA/test and production API urls, private certificates, and API keys/locations.

    In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection. You’ll learn:
    -Common app vulnerabilities and the sensitive information they can reveal
    -Top development mistakes that lead to data exposure
    -Strategies for implementing app protection into the software development lifecycle
  • Your App Security Stack: How to Defend Against the Evolving Threat
    Your App Security Stack: How to Defend Against the Evolving Threat
    Ken Jochims, Arxan Director of Product Marketing | Amy DeMartine, Forrester Principal Analyst Recorded: Feb 12 2019 25 mins
    Web and mobile applications have become the primary customer touchpoint for financial services, payments, hospitality, travel and scores of other businesses. With the increased dependence on applications comes greater opportunity for attacks to expose customer data, sensitive IP, or a roadmap into an organisation’s back-end infrastructure. In 2018 high-profile attacks hit major hotel chains, international airlines and banks, leaving companies in a tailspin to repair customer trust and brand damage. The top two attack methods for such breaches? Software vulnerabilities and web app attacks.

    Join Arxan Director of Product Marketing Ken Jochims and special guest Forrester Principal Analyst Amy DeMartine to learn how the threat landscape may evolve in 2019, and what you can do to strengthen app security. We’ll cover:

    -What makes applications inherently insecure
    -The anatomy of an application attack (web and mobile)
    -How to build your security stack to defend against app level threats
  • Your App Security Stack: How to Defend Against the Evolving Threat
    Your App Security Stack: How to Defend Against the Evolving Threat
    Ken Jochims, Arxan Director of Product Marketing | Amy DeMartine, Forrester Principal Analyst Recorded: Feb 5 2019 26 mins
    Web and mobile applications have become the primary customer touchpoint for financial services, payments, hospitality, travel and scores of other businesses. With the increased dependence on applications comes greater opportunity for attacks to expose customer data, sensitive IP, or a roadmap into an organization’s back-end infrastructure.

    In 2018 high-profile attacks hit major hotel chains, international airlines and banks, leaving companies in a tailspin to repair customer trust and brand damage. The top two attack methods for such breaches? Software vulnerabilities and web app attacks.

    Join Arxan Director of Product Marketing Ken Jochims and special guest Forrester Principal Analyst Amy DeMartine to learn how the threat landscape may evolve in 2019, and what you can do to strengthen your app security posture. We’ll cover:

    -What makes applications inherently insecure
    -The anatomy of an application attack (web and mobile)
    -How to build your security stack to defend against app level threats
  • Protecting Mobile, PC/Mac and Online Games
    Protecting Mobile, PC/Mac and Online Games
    Dave Bott, Arxan Security Engineer, and Ken Jochims, Arxan Director of Product Marketing Recorded: Oct 30 2018 16 mins
    Piracy, cheating, counterfeiting and other attacks can make or break a game economy. But common game security techniques have a reputation for slowing game performance, hurting user experience and being ineffectual. It puts the burden of security expertise on developers and often disrupts the software development lifecycle, slowing down time-to-market. But it doesn’t have to be this way.

    Join Arxan Security Engineer Dave Bott as he shares security strategies to protect your web and mobile games, help you fight back against hacks, cracks, and theft, and maximize revenue, all without compromising performance or slowing time to market. We'll cover:

    -How to defend games against tampering that leads cheating and piracy
    -How app hardening and data and key encryption can help prevent content theft and fraudulent licenses
    -The benefits of real-time threat data and how to incorporate it into your security strategy to block and frustrate attackers
  • Preventing Financial Application Breaches: Why App Security Matters
    Preventing Financial Application Breaches: Why App Security Matters
    Ken Jochims, Arxan Director of Product Marketing | Chris Mizell, Arxan Senior Security Engineer Recorded: Oct 25 2018 27 mins
    Think the attacks that breached two international air carriers’ applications can’t happen to your organisation? If you’re relying on network or device security solutions to protect your apps, you might want to think again.

    Web and mobile applications are among the most common weak points in an organisation’s security posture, and that includes financial services institutions. Traditional security measures like firewalls, WAFs or device solutions can’t defend web and mobile apps from reverse engineering or tampering.

    To adequately protect APIs, customer data, valuable IP and your backend systems, you need to rethink your security approach. Join Arxan Senior Security Engineer Chris Mizell and Director of Product Marketing Ken Jochims to learn:

    -How to protect your mobile and web banking apps with app shielding technology
    -How visibility into your app ecosystem can help stop attackers and prevent breaches
    -How to implement app protection without getting in the way of your development cycle
  • Protecting Connected Healthcare Applications from the Inside Out
    Protecting Connected Healthcare Applications from the Inside Out
    Paul Dant, Arxan Senior Security Engineer & Ken Jochims, Arxan Director of Product Marketing Recorded: Oct 23 2018 31 mins
    As connected medical devices become more commonplace, so do the threats of cyberattacks targeting applications that connect to these devices. Inadequately protected apps are vulnerable to reverse engineering and tampering, which can threaten patient safety, expose sensitive data, compromise valuable IP, and result in lost revenue, regulatory and governmental penalties. Traditional perimeter, network or device security methods are not sufficient to prevent these types of attacks.

    Join Arxan to learn how to defend your web and mobile apps, improve patient safety, protect IP, and help prevent data breaches.
  • Securing Connected Vehicle Applications
    Securing Connected Vehicle Applications
    Matt Clemens, Arxan Security Solutions Architect & Ken Jochims, Arxan Director of Product Marketing Recorded: Oct 16 2018 27 mins
    As connected cars become mainstream, the mobile applications that interact with them continue to evolve and add sophisticated functionality. This creates a growing security risk from vulnerable mobile apps that provide access to a wide range of critical vehicle functionality.

    Without intelligently protecting these mobile apps, connected car manufacturers and customers will become targets for cybercriminals looking to take advantage of this new and expanding market.

    Learn how to protect connected car apps and help prevent reverse engineering attacks with application hardening and real-time threat analytics. In this workshop, you’ll learn:

    -How to reduce the risks associated with unprotected vehicle apps
    -How to implement a robust application protection solution without disrupting the software development lifecycle.
    -The benefits of real-time threat data and how to incorporate it into your security strategy
  • Preventing Financial Application Breaches: Why App Security Matters
    Preventing Financial Application Breaches: Why App Security Matters
    Ken Jochims, Arxan Director of Product Marketing | Chris Mizell, Arxan Senior Security Engineer Recorded: Oct 10 2018 27 mins
    Think the attacks that breached two international air carriers’ applications can’t happen to your organization? If you’re relying on network or device security solutions to protect your apps, you might want to think again.

    Web and mobile applications are the most common weak point in an organization’s security posture, and that includes financial services institutions. Traditional security measures like firewalls, WAFs or device solutions can’t defend web and mobile apps from reverse engineering or tampering.

    To adequately protect APIs, customer data, valuable IP and your backend systems, you need to rethink your security approach. Join Arxan Senior Security Engineer Chris Mizell and Director of Product Marketing Ken Jochims to learn:

    -How to protect your mobile and web banking apps with app shielding technology
    -How visibility into your app ecosystem can help stop attackers and prevent breaches
    -How to implement app protection without getting in the way of your development cycle
  • Trust But Verify: Mobile App Protection Best Practices - Arxan AppSec Series 3/3
    Trust But Verify: Mobile App Protection Best Practices - Arxan AppSec Series 3/3
    Chris Stahly, Arxan Senior Security Architect | Deborah Clark McGinn, Arxan VP of Marketing Recorded: May 24 2018 59 mins
    Traditional network and app security approaches are no longer sufficient to protect high-value apps running in untrusted environments. Knowing the status of apps running in the wild and whether they are under attack is key to responding to the ever changing threat landscape. Visibility into when, how and from where an attack is happening, and the ability to optimize your response in real time can mean the difference between stopping a threat before it spreads or picking up the pieces after the fact.

    In part three of our application security series, we’ll share best practices for app protection and mitigation, plus how Arxan’s comprehensive app protection and alerting capabilities can help prevent reverse engineering, code tampering, IP theft, and help level the playing field with attackers.

Embed in website or blog