Assessing the Security of Mobile applications (Part 2) - Testing the application

by Ricky M. and Monique L. Magalhaes
Sept. 1, 2017 0 comments TechGenix mobile & wireless security

To support BYOD and to take advantage of the multiple applications available to organisations it’s essential that the applications be properly vetted before installation and use so that any vulnerability can be uncovered and organisations can improve business function with minimal risk. It’s very important that applications are secure and function as intended. To recap we concluded that the app assessing process should include: Planning (covered in article one) Testing of applications (covered in this article and the third article of this series) Application approval or rejection (to be covered in the third article of this series) In the first article of this series we looked at planning, the initial steps in the application vetting process.