O'Reilly logo

Bring Your Own Device - The mobile computing challenge by BCS, The Chartered Institute for IT

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

11 EVERYTHING OLD IS NEW AGAIN

Concern over application vulnerabilities is growing: climbing to become the number one security concern in a Global Information Security Workforce study. About 70 per cent of the information security professionals participating in the survey identified software as their top security concern. One of the areas driving this concern is the proliferation of new mobile applications, with cloud-based services and consumer-owned devices (BYOD) infiltrating business systems. Paco Hope, a member of the (ISC)2 Application Security Advisory Board, considers five principles of secure mobile development.

In such a rapidly evolving ecosystem, ensuring that security is prioritised is challenging, particularly given the development ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required