MOBILE API SECURITY TECHNIQUES PART 3

Tue 07 March 2017 By Skip Hovsmith

Category: API Keys, A Series - Mobile API Security

Mobile apps commonly use APIs to interact with backend services and information. In 2016, time spent in mobile apps grew an impressive 69% year to year, reinforcing most companies' mobile-first strategies, while also providing fresh and attractive targets for cybercriminals. As an API provider, protecting your business assets against information scraping, malicious activity, and denial of service attacks is critical in maintaining a reputable brand and maximizing profits.

Read More

MOBILE API SECURITY TECHNIQUES PART 2

Tue 21 February 2017 By Skip Hovsmith

Category: API Keys, A Series - Mobile API Security

Mobile apps commonly use APIs to interact with backend services and information. In 2016, time spent in mobile apps grew an impressive 69% year to year, reinforcing most companies' mobile-first strategies, while also providing fresh and attractive targets for cybercriminals. As an API provider, protecting your business assets against information scraping, malicious activity, and denial of service attacks is critical in maintaining a reputable brand and maximizing profits.

Read More

MOBILE API SECURITY TECHNIQUES PART 1

Tue 24 January 2017 By Skip Hovsmith

Category: API Keys, A Series - Mobile API Security

Mobile apps commonly use APIs to interact with backend services and information. In 2016, time spent in mobile apps grew an impressive 69% year to year, reinforcing most companies mobile-first strategies, while also providing fresh and attractive targets for cybercriminals. As an API provider, protecting your business assets against information scraping, malicious activity, and denial of service attacks is critical in maintaining a reputable brand and maximizing profits.

Read More

Page 1 of 1