Defending Behind the Device: Mobile Application Risks

  • Tuesday, February 28, 2012 | 3:50 PM – 5:00 PM | Room: Room 104
View all Sessions

Risks to mobile devices are similar to those of traditional software applications and a result of insecure coding practices. However, mobile devices aren’t just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks and an easier opportunity for those with malicious intent.

Participants

This document was retrieved from http://www.rsaconference.com/events/us12/agenda/sessions/719/defending-behind-the-device-mobile-application on Fri, 19 Sep 2014 03:48:31 -0400.
© 2014 EMC Corporation. All rights reserved.