Check Point® Software Technologies Ltd. announced its inclusion in Fast Company’s Next Big Things in Tech 2025 list.
Mobile apps are everywhere. They handle payments, authentication, messaging, and health data — often all in the same session. But most organizations still approach mobile security like it's an extension of the web. It's not.
Attacks on mobile apps jumped 80% last year. Mobile apps still ship with known vulnerabilities. And the reality is, attackers have figured out what most teams haven't: Mobile is often the weakest link in the stack.
What makes mobile security different isn't only the technology but the environment it lives in.
Why Mobile Plays by Different Rules
Start with the obvious: fragmentation. Web apps run in browsers. Mobile apps run across thousands of Android builds, OS versions, and hardware configurations. No consistent baseline. No guaranteed behavior.
Mobile apps don't just access a database or hit an API, they reach into location data, sensors, cameras, local files, and even background activity. They're more deeply integrated with the user's life and device than any web app ever will be.
And then there's the SDK problem. Most apps rely on a long list of third-party SDKs — analytics, payments, push notifications, and ads. If one of them introduces a vulnerability, the app inherits it.
The distribution looks different, too. On the web, you control deployment. On mobile, you're publishing to an app store. The binaries can be downloaded, decompiled, and modified. That's not a theoretical risk. It happens every day.
Why Traditional DevSecOps Doesn't Work
Most pipelines were designed for web and backend services. They're not built to handle the risks mobile introduces.
Take reverse engineering. Most teams don't account for it. Yet it's one of the most common attacks — modifying APKs to bypass payments or inject malicious code. It usually works because the app relies on local checks, stores sensitive logic on the device, and skips basic protections like code obfuscation.
Static analysis tools help, but they miss what only shows up on real devices: insecure storage, data leakage, and runtime hooks. Testing only on emulators isn't enough.
API protection is another area where mobile diverges. Mobile apps cache, retry, and handle sessions differently. The API behavior from a mobile app often doesn't resemble a browser at all. If you're only looking at it through a web lens, you're missing real threats.
And if a security tool slows things down, developers will either ignore it or work around it. That's just the reality of high-velocity teams.
What Needs to Change
Mobile apps need a dedicated security track. Treating them like a branch of your web stack leads to blind spots. Instead, here's what I recommend putting in place:
■ Run tests on real devices. Emulators miss risks associated with real-time user activity. Include older OS versions and rooted environments in your test suite.
■ Review SDKs like you would in-house code. Test them before use and monitor them in production. Most vulnerabilities now come through dependencies.
■ Build mobile-specific threat models. Include things like background activity, permission misuse, tracker permissions, and data storage.
■ Obfuscate and harden your app by default. Reverse engineering is a standard practice for attackers.
■ Automate security in CI/CD. But keep it focused. No noise, no false alarms. Developers don't tolerate anything that slows go-to-market.
■ Encrypt everything.
Logs, local storage, and cached data. Assume the device will be compromised.
These are table stakes. Anything less is negligent.
Making DevSecOps Work for Mobile
Most security programs are built around infrastructure and backend services. But mobile is a client-side problem running on someone else's hardware, with your code exposed.
So, the strategy has to shift.
■ Start by building threat models that reflect mobile's real-world attack surface. Don't reuse your backend template. Mobile introduces its own risks, and they show up early in the design phase.
■ Test your apps the same way attackers do. On real devices. In messy environments. On old OS versions. That's where the bugs live.
■ Treat SDKs like untrusted code, even if they're popular. Review their behavior, monitor their updates, and don't assume they're secure just because they're widely used.
■ Encrypt everything that can be accessed on the device. Don't log sensitive data. Don't hardcode secrets. And don't leave the app defenseless against tampering or modification.
■ Automate wherever possible. But automation only works if it's trusted. That means reducing false positives and integrating into workflows that developers already follow.
Mobile security is broken because the tools and mindsets haven't kept up with how mobile apps are built, shipped, and used.
Secure mobile starts with a mindset shift. If you're leading DevSecOps, advocate for a mobile-first lens. The sooner that shift happens, the sooner mobile becomes manageable. Not bulletproof, but manageable. And that's a big step forward.
Industry News
Kong announced the native availability of Kong Identity within Kong Konnect, the unified API and AI platform.
Amazon Web Services (AWS) is introducing a new generative AI developer certification, expanding its portfolio for professionals seeking to develop their cloud engineering skills.
Kong unveiled KAi, a new agentic AI co-pilot for Kong Konnect, the unified API and AI platform.
Azul and Cast AI announced a strategic partnership to help organizations dramatically improve Java runtime performance, reduce the footprint (compute, memory) of cloud compute resources and ultimately cut cloud spend.
Tricentis unveiled its vision for the future of AI-powered quality engineering, a unified AI workspace and agentic ecosystem that brings together Tricentis’ portfolio of AI agents, Model Context Protocol (MCP) servers and AI platform services, creating a centralized hub for managing quality at the speed and scale of modern innovation.
Kong announced new support to help enterprises adopt and scale MCP and agentic AI development.
Copado unveiled new updates to its Intelligent DevOps Platform for Salesforce, bringing AI-powered automation, Org Intelligence™, and a new Model Context Protocol (MCP) integration framework that connects enterprise systems and grounds AI agents in live context without silos or duplication.
Xray announced the launch of AI-powered testing capabilities, a new suite of human-in-the-loop intelligence features powered by the Sembi IQ platform.
Redis announced the acquisition of Featureform, a framework for managing, defining, and orchestrating structured data signals.
CleanStart announced the expansion of its Docker Hub community of free vulnerability-free container images, surpassing 50 images, each refreshed daily to give developers access to current container builds.
The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, announced the graduation of Knative, a serverless, event-driven application layer on top of Kubernetes.
Sonatype announced the launch of Nexus Repository available in the cloud, the fully managed SaaS version of its artifact repository manager.
Spacelift announced Spacelift Intent, a new agentic, open source deployment model that enables the provisioning of cloud infrastructure through natural language without needing to write or maintain HCL.