paint-brush
Mobile API Security Techniquesby@skiph
63,612 reads
63,612 reads

Mobile API Security Techniques

by Skip Hovsmith7mJanuary 25th, 2017
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow
EN

Too Long; Didn't Read

Mobile apps commonly use APIs to interact with back end services and information. In 2016, time spent in <a href="https://www.flickr.com/photos/138382953@N08/31415282864/in/dateposted-public/" target="_blank">mobile apps grew an impressive 69% year to year</a>, reinforcing most companies mobile-first strategies, while also providing fresh and attractive <a href="https://www.approov.io/blog/theres-a-fake-app-for-that.html" target="_blank">targets for cybercriminals</a>. As an API provider, protecting your business assets against information scraping, malicious activity, and denial of service attacks is critical in maintaining a reputable brand and maximizing profits.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Mobile API Security Techniques
Skip Hovsmith HackerNoon profile picture
Skip Hovsmith

Skip Hovsmith

@skiph

Developer and Advocate — Software Performance and API Security

About @skiph
LEARN MORE ABOUT @SKIPH'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Skip Hovsmith HackerNoon profile picture
Skip Hovsmith@skiph
Developer and Advocate — Software Performance and API Security

TOPICS

Languages

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite