paint-brush
Mobile API Security Techniquesby@skiph
63,783 reads
63,783 reads

Mobile API Security Techniques

by Skip HovsmithJanuary 25th, 2017
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Mobile apps commonly use APIs to interact with back end services and information. In 2016, time spent in <a href="https://www.flickr.com/photos/138382953@N08/31415282864/in/dateposted-public/" target="_blank">mobile apps grew an impressive 69% year to year</a>, reinforcing most companies mobile-first strategies, while also providing fresh and attractive <a href="https://www.approov.io/blog/theres-a-fake-app-for-that.html" target="_blank">targets for cybercriminals</a>. As an API provider, protecting your business assets against information scraping, malicious activity, and denial of service attacks is critical in maintaining a reputable brand and maximizing profits.
featured image - Mobile API Security Techniques
Skip Hovsmith HackerNoon profile picture
Skip Hovsmith

Skip Hovsmith

@skiph

L O A D I N G
. . . comments & more!

About Author

Skip Hovsmith HackerNoon profile picture
Skip Hovsmith@skiph

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite