Information Security

Mobile Apps under Attack – New Frontiers for Securing Mobile Applications

Play
Play
Share!

Share this Podcast

MyCast

MyCast

MyCast Subscription

Information Security

Caleb Barlow

IBM Massachusetts Laboratory

Description: IT Security Podcast from IBM

Most Recent Post

Mobile Apps under Attack – New Frontiers for Securing Mobile Applications

Play Download media
In this podcast, Caleb talks with Jukka Alanen about how mobile apps are under attack, how apps are being exploited by hackers, and what organizations can do safeguard their brands, data, IP, and revenue while developing and releasing new mobile apps. Already 78% of Top 100 iOS and Android apps have been found as hacked, rogue versions, and industry organizations across OWASP, security consultancies, and analysts have started recommending new protection measures. Jukka Alanen is Vice President of Business Development and Corporate Strategy at Arxan Technologies, Inc, a security company that specializes in Application Protection. Recently, IBM and Arxan announced a new preventive security solution that extends the IBM portfolio to app hardening and run-time protection. 

Last 5 Posts

Assets Gone Wild? Your Asset Management Squad.

Play Download media
Did you know there are approximately 9 billion devices, assets, and ‘things’currently connected to a network?  Over  the next decade that number is expected to increase significantly with estimates ranging from 50 billion to nearly 1 trillion! It's about engine control units on industrial ve...

Bird's Eye View: What I've Learned Working In Cyber Security

Play Download media
In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what makes being an IBM Fellow so rewarding and will shed s...

Beyond Testing: Application Security Management

Play Download media
In this podcast Caleb talks with Diana Kelley and Doug Wilson, two experts in the field of application security to discuss how software testing is rapidly maturing to risk based application security approach.  We will introduce a new framework for application security that covers Test, Assure and P...

Methods for Extending Visibility to Servers to Detect APT and Insider Abuse

Play Download media
Security and Information Event Managers (SIEM) tools rely heavily on perimeter security logs, like those from firewalls, IPS and router NetFlow, The sharing of these logs with SIEMs have been very successful in identifying sophisticated external attacks in very early stages.  Now, for most organiza...

Understanding Heartbleed - What you need to know.

Play Download media
As security professionals scramble to address the potential impact of Heartbleed we take a moment to pause and describe what Heartbleed is all about, how it occurred and practical advice on how to address the risk on your systems. Michael Hamelin from the IBM X-Force research team joins us to descri...

Guest Book




Receive feedback for your podcast via SpeakPipe