{"id":77231,"date":"2020-09-03T12:32:53","date_gmt":"2020-09-03T04:32:53","guid":{"rendered":"https:\/\/www.i-sprint.com\/?p=77231"},"modified":"2020-09-03T12:32:56","modified_gmt":"2020-09-03T04:32:56","slug":"webinar-app-protection","status":"publish","type":"post","link":"https:\/\/www.i-sprint.com\/ja\/webinar-app-protection\/","title":{"rendered":"Webinar &#8211; Mobile Applications: Emerging Threats, Vulnerabilities and Counter-measures"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p><a href=\"https:\/\/us02web.zoom.us\/webinar\/register\/4615991068323\/WN_7QLZlQHMTR-x0KL4V9eIUA\"><img decoding=\"async\" class=\"alignleft wp-image-77235 size-large\" src=\"https:\/\/www.i-sprint.com\/wp-content\/uploads\/2020\/09\/17-Sep-Banner-1280x450-1-1024x360.png\" alt=\"Webinar Banner\" width=\"1024\" height=\"360\" srcset=\"https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/09\/17-Sep-Banner-1280x450-1-200x70.png 200w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/09\/17-Sep-Banner-1280x450-1-300x105.png 300w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/09\/17-Sep-Banner-1280x450-1-400x141.png 400w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/09\/17-Sep-Banner-1280x450-1-600x211.png 600w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/09\/17-Sep-Banner-1280x450-1-768x270.png 768w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/09\/17-Sep-Banner-1280x450-1-800x281.png 800w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/09\/17-Sep-Banner-1280x450-1-1024x360.png 1024w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/09\/17-Sep-Banner-1280x450-1-1200x422.png 1200w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2020\/09\/17-Sep-Banner-1280x450-1.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><\/a><\/p>\n<p>Mobile devices are becoming part and parcel of everyday life. More users are using mobile apps to conduct banking, shopping, checking of sensitive information than before. Even credential authentication has been tapping on mobile device capability. Recent years, various vulnerabilities of mobile platforms have been reported, which have resulted in the stealing of credentials and sensitive data. Hence, it is important to look at In-App protection or run-time application self-protection as part of your mobile application security strategy.<\/p>\n<p>In this webinar, we will share with you on:<\/p>\n<ul>\n<li>Emerging trends and vulnerability on mobile applications<\/li>\n<li>Why does it matter to mobile app owners\/ developers<\/li>\n<li>How can you protect your business or authentication applications against such vulnerabilities<\/li>\n<\/ul>\n<p>Join us and hear from our speakers from i-Sprint Innovations and Promon as they share with you on trends and mobile security.<\/p>\n<p>Date: 17 September 2020, Thursday<br \/>\nTime: 2pm (SGT\/ MYT)<\/p>\n<p><a href=\"https:\/\/us02web.zoom.us\/webinar\/register\/4615991068323\/WN_7QLZlQHMTR-x0KL4V9eIUA\" target=\"_blank\" rel=\"noopener noreferrer\">Register Now!<\/a><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Join us on Thursday, 17 September 2020 and hear from our speakers from i-Sprint Innovations and Promon as they share with you on trends and mobile security.<\/p>\n","protected":false},"author":141,"featured_media":77243,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","footnotes":""},"categories":[169],"tags":[],"class_list":["post-77231","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-ja"],"_links":{"self":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/77231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/comments?post=77231"}],"version-history":[{"count":2,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/77231\/revisions"}],"predecessor-version":[{"id":77241,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/77231\/revisions\/77241"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media\/77243"}],"wp:attachment":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media?parent=77231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/categories?post=77231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/tags?post=77231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}