Defending Behind the Device: Mobile Application Risks

  • Thursday, October 11, 2012 | 8:40 – 9:30 | Buckingham (East Wing)
View all Sessions

Risks to mobile devices are similar to those of traditional software applications and a result of insecure coding practices. But mobile devices aren’t just small computers: they are designed around personal and communication functionality. This makes the top mobile applications risks different from the top traditional computing risks - and an easier opportunity for those with malicious intent.

Participants

This document was retrieved from http://www.rsaconference.com/events/eu12/agenda/sessions/586/defending-behind-the-device-mobile-application on Thu, 23 Oct 2014 06:08:08 -0400.
© 2014 EMC Corporation. All rights reserved.