dcsimg
Login | Register   
RSS Feed
Download our iPhone app
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX

By submitting your information, you agree that devx.com may send you DevX offers via email, phone and text message, as well as email offers about other products and services that DevX believes may be of interest to you. DevX will process your information in accordance with the Quinstreet Privacy Policy.


advertisement
 

NIST Publishes Mobile App Security Recommendations

The report says enterprises shouldn't trust that app stores have done a good job checking the security of the apps they make available.


advertisement

WEBINAR:

On-Demand

Application Security Testing: An Integral Part of DevOps


The National Institute of Standards and Technology (NIST) has released a new report titled "Vetting the Security of Mobile Applications." The report urges enterprises to put apps through a "vetting" process that includes security testing before allowing employees to use them.

"This process is performed on an app after the app has been developed and released for distribution but prior to its deployment on an organization’s mobile device," the NIST wrote. "An app vetting process acknowledges the concept that someone other than the software vendor is entitled to evaluate the software’s behavior, allowing organizations to evaluate software in the context of their own security policies, planned use, and risk tolerance."

The report points out that the mobile development industry hasn't always done a good job with security, and says that enterprises shouldn't rely on app stores or other third parties to verify security. It details the types of vulnerabilities enterprise testers should look for as well as the kind of tests that can find them.



View article



   
Comment and Contribute

 

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

 

Sitemap
×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.
Thanks for your registration, follow us on our social networks to keep up-to-date