BrainBlog for Approov, by Jason Bloomberg in Security Boulevard
Focusing on user authentication, including multi-factor authentication, is not enough to put mobile at the center of your cybersecurity strategy. It is essential to ensure the integrity of devices, applications, and communication channels, along with securing API access.
Digital transformation has been with us for over a decade now, and most enterprises have made significant progress toward achieving its customer-facing goals.
Realigning siloed organizational models to better meet the needs of customers, employees, and others is no easy task – and indeed, companies have achieved varying levels of success.
While digital transformation is more about such organizational change than technology, tech unquestionably plays an important enabling role. In particular, mobile applications are central to many organizations’ digital strategies.
Mobile-first thinking, in fact, now pervades discussions of digital transformation. Mobile devices are now ubiquitous, and mobile apps are both widely accepted and enormously powerful.
While such mobile-first digital strategies are the norm, mobile-first cybersecurity strategies are not. Instead, cybersecurity becomes more of an afterthought than an integral part of the digital strategy.
While it’s true that mobile apps are among the various endpoints that bad actors might use to breach the organization, but as endpoints, they are on the periphery of the cybersecurity strategy.
As a result, there is a strategic disconnect within most enterprises: mobile is at the center of their digital strategy but peripheral to their cybersecurity strategy. Shouldn’t mobile be at the center of their cybersecurity strategy as well?
Click here to read the entire article.