Threatcast
How Developers Can Secure Mobile App Wallets for Peer-to-Peer Payments
8 minute read | December 17, 2024Digital wallets are no longer just an alternative; they have become a key pillar of global commerce. In 2023, these platforms processed an astonishing $13.9 trillion in transactions, representing half of all online payments and 30% of point-of-sale...
Read more
9 min read
| July 16, 2024
Enabling Safe IoT Devices with Mobile App Security
AppSweep
Security testing
Compliance
Threatcast
Threat monitoring
9 min read
| May 14, 2024
10 Types of Man-in-the-Middle Attacks & How to Avoid Them
Protection
Dexguard
iXGuard
Threatcast
Threat monitoring
11 min read
| April 17, 2024
Protecting Runtime Integrity with RASP & Threat Monitoring
Dexguard
iXGuard
Threatcast
Threat monitoring
5 min read
| April 1, 2024
Resetting the Clock with Compiler-Based Tools in Mobile AppSec
Protection
Dexguard
iXGuard
Threatcast
7 min read
| January 9, 2024
4 Common Mobile App Security Myths: Busted
Protection
Security testing
Threatcast
Threat monitoring
Thought leadership
General
10 min read
| December 12, 2023
Threat Monitoring: Your Mobile App Security Secret Weapon
Threatcast
Threat monitoring
6 min read
| May 16, 2023
How to Make Your Anti-Cheat Strategies More Actionable with ThreatCast
Threatcast
Threat monitoring
Gaming
Thought leadership
14 min read
| March 8, 2022
Beyond Control Flow Flattening: Advanced Software Obfuscation Techniques
Threatcast
Threat monitoring
Thought leadership
9 min read
| December 14, 2021
Why You Should Consider Mobile Threat Monitoring
Threatcast
Threat monitoring
Thought leadership
How to Improve Your Anti-Fraud Strategy with Runtime Threat Insights
https://www.guardsquare.com/blog/improve-anti-fraud-strategy-with-runtime-data
Enabling Safe IoT Devices with Mobile App Security
https://www.guardsquare.com/blog/enabling-safe-iot-devices
10 Types of Man-in-the-Middle Attacks & How to Avoid Them
https://www.guardsquare.com/blog/how-to-avoid-mitm-attacks
Protecting Runtime Integrity with RASP & Threat Monitoring
https://www.guardsquare.com/blog/protecting-runtime-integrity-with-rasp-threat-monitoring
Resetting the Clock with Compiler-Based Tools in Mobile AppSec
https://www.guardsquare.com/blog/mobile-appsec-clock-resetting
4 Common Mobile App Security Myths: Busted
https://www.guardsquare.com/blog/common-mobile-app-security-myths
Threat Monitoring: Your Mobile App Security Secret Weapon
https://www.guardsquare.com/blog/threat-monitoring-secret-weapon
How to Make Your Anti-Cheat Strategies More Actionable with ThreatCast
https://www.guardsquare.com/blog/threatcast-make-anti-cheat-strategies-actionable
Beyond Control Flow Flattening: Advanced Software Obfuscation Techniques
https://www.guardsquare.com/blog/beyond-control-flow-flattening-advanced-software-obfuscation-techniques
Why You Should Consider Mobile Threat Monitoring
https://www.guardsquare.com/blog/why-you-should-consider-mobile-threat-monitoring
General Terms | Privacy Policy | Cookie Policy | Security
Tervuursevest 362 bus 1, 3000 Leuven, Belgium |
VAT: BE0550675829 |
© 2016-2024 Guardsquare nv. All rights reserved.