Feeds

Merry Christmas and a Happy New Year

Festive Greetings

  • alert
  • submit to reddit

Top three mobile application threats

The headline says it all.

Reg Hardware is packing up for the festive period, but we'll be back after the break before heading off to Las Vegas for the Consumer Electronics Show (CES), from which we'll be bringing you all the hot stories and cool products demo'd at the event.

Meantime, please don't forget to cast your vote in the Reg Hardware Readers Awards 2010, which you can do here. Remember, all entries go into our Xbox 360 prize draw, courtesy of Xbox Live.

So, have a great time with your friends and family, enjoy all the tech treats waiting for you under the tree. Thanks for your support - and vigorous commenting - in 2010.

See you in 2011.

Cheers,

Tony and the Reg Hardware team

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.