When it comes to information security, we face similar challenges to Capitan Kirk and his Starship Enterprise; it’s just that the Klingons are replaced with a different kind of bad guy. And applications continue to top the list of our bad guy’s favorite targets. In fact, research suggests that 80% of successful breaches target the application layer. What’s more, with the explosive growth of the mobile channel and user demand for anytime/anywhere access to mobile services, mobile apps are stretching the boundaries of security, and putting them squarely in the crosshairs when it comes to malicious attacks.
