Blog

Anyone developing software applications today can easily feel overwhelmed by the persistent security threats their products face from application counterfeiting Read more
With our recent DashO releases, we’ve been working to make our Android support even easier to use. A great example Read more
Applications are vulnerable. Eighty-six percent of web apps have access control and authentication issues, while 80 percent of mobile apps may unwittingly Read more
DashO 10 is now available, with support for R8. Migration to DashO is now easier than ever! Over the past Read more
Five Penetration Test Tips to Create Secure Mobile Apps Just as businesses and consumers make the shift from desktop-driven digital Read more
I am not a superstitious person and I don’t believe in magic, but even still – I have to confess Read more
Welcome to the Support Corner, where we’ll occasionally talk about topics that we’re seeing while working with our customers. If Read more
Mobile App Security and Best Practices: Leveraging the OWASP 3-Layer Model The mobile attack surface is expanding. As of January Read more
Welcome to the Support Corner, where we’ll occasionally talk about topics that we’re seeing while working with our customers. If Read more
1,000% increase in Dotfuscator usage among Xamarin app developers drives powerful new app and data security features. SEATTLE, WA — Read more
How important is root detection? Rooted devices can be extremely dangerous: When running on a rooted device, an otherwise harmless Read more
Microsoft Build is right around the corner! You have stopped by our booth in the past, so we wanted to Read more
2018’s RSA Conference is in the books; IT professionals and C-suite executives are heading back to work, ready to leverage Read more
“Software is eating the world.” The now-famous quote by technology expert Marc Andreessen was relevant in 2011 but seems downright Read more
I just read the Forrester Wave™: Governance, Risk, And Compliance Platforms, Q1 2018. Forrester reminds us all that “Risk and Read more
IT security is a hot topic, and no wonder — major healthcare, finance and government breaches have all made headlines Read more
Preventing Privilege Escalation in mobile payment apps (PCI Mobile Payment Acceptance Security Guidelines Section 4.3) Regulators, standards bodies and IT Read more
When perimeters are breached, identities stolen and malware launched, encryption stands as information’s last line of defense. Without effective encryption Read more
Java 9 is an unusually-complex Java release. It comes with deep changes to some long-held norms, compatibility-breaking changes at build Read more
First, thanks to PreEmptive for inviting me to do a guest post. Since you're reading this on preemptive.com, you are Read more
Applications are under siege. As demonstrated by the recent Equifax breach and many others, hackers leveraged everything from compromised mobile Read more