Application Security , Endpoint Security , Events

Mobile App Security Using No-Code Cyber Defense Automation

Appdome's Tom Tovar Describes How to Address the Challenges of Securing Mobile Apps
Tom Tovar, CEO, Appdome

Today's companies need to prioritize security from and accept liability for application security. They also need to provide greater visibility into cyberattacks in this era of booming security vulnerability.

See Also: On Demand | The Dark Side of AI: Unmasking its Threats and Navigating the Shadows of Cybersecurity in the Digital Age

How can you tackle mobile app security and address user concerns about usability? No-code cyber defense automation can be used to achieve security outcomes in seconds, build desired protections and prevent fraud and malware directly inside the CI/CD pipeline, said Appdome CEO Tom Tovar.

In this video interview with Information Security Media Group at Infosecurity Europe, Tovar discussed:

  • Making cyber defense for mobile apps and devices important for everyone;
  • Ensuring new protections are added as organizations grow;
  • The latest technology innovations for mobile bot defense;

Tovar is passionate about building products that dramatically improve how we live and work. He primarily focuses on securing the mobile app economy from the ground up and introducing a new era in DevSecOps platforms designed to make the job of protecting mobile apps, mobile customers and mobile businesses faster and easier.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.