CISO Trainings , Fraud Management & Cybercrime , Mobile Application Security

The State of Enterprise Mobile App Security 2023: Results Analysis

Benchmarking the Various Security Approaches to Mobile Applications

One of the fastest-growing enterprise security threats is from compromised mobile apps and the millions of unmanaged consumer devices using them.

Surprisingly, security professionals have a false sense that app stores such as Google Play and Apple Store are ensuring that apps available for download are adequately protected. Unfortunately, this is not the case.

In Q2 & Q3 2023, ISMG conducted the "State of Enterprise Mobile App Security Survey," sponsored by Verimatrix, anonymously polling over 100 senior cybersecurity professionals to gain a deeper understanding of mobile app security practices, to raise peer awareness while dispelling misconceptions, and to identify the responsibility hot potato: CISOs vs. SOC teams vs. app developers – internal/external.

Jon Samsel, senior vice president of global marketing at Verimatrix, explained the background of the survey and discussed the key findings, including the discrepancies between perception and reality:

Compromised mobile apps can be an open door to critical enterprise app servers and other back-end systems, and this survey aims to shine a light on a potential hole in most enterprise security walls – exposing potential gaps in CISO awareness.Download the complete survey results report here and enable your team to benchmark your organization against your peers and utilize the best practices to plan for progress in 2024.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.