Thursday, October 9, 2025
Distribution: (800) 510 0384
Washington DC
New York
Toronto
Press ID  
  • Login
The Hudson Weekly
  • Financial
  • Blockchain
  • Technology
  • Entertainment
  • Lifestyle
  • Arts
  • Health
  • Sports
  • Cybersecurity
No Result
View All Result
  • Financial
  • Blockchain
  • Technology
  • Entertainment
  • Lifestyle
  • Arts
  • Health
  • Sports
  • Cybersecurity
No Result
View All Result
The Hudson Weekly
No Result
View All Result

South-East Asia the Next Boom for Mobile Apps Security – SecIron COO Nicole Ban Shares Her View

Ryan Offman by Ryan Offman
September 27, 2021
in Technology
A A
Share on FacebookShare on Twitter

South-East Asian countries (ASEAN) such as Malaysia, Singapore, Indonesia, and Thailand are currently experiencing rapid growth in Mobile Application in terms of onboarding, digital transactions, and service deliveries. Of late, South-East Asia has seen an increasing surge of cybersecurity attacks on mobile applications across industries such as finance, government, and eCommerce. It has become important to enforce authentication, encrypt mobile communications, scan mobile apps for malware, prevent data leaks and protect application data on devices.

To further understand the importance of mobile security across Asia, we have conducted a quick chat with SecIron COO, Ms. Nicole Ban. She is the Chief Operating Officer at SecIron – One of Asia’s leading Mobile Application Security solutions provider. SecIron is focused on securing mobile experiences through innovation and development of Mobile Application Security technologies in safeguarding business and communities from cybercriminals and mobile threats. Through her website, she and her team are aimed at providing comprehensive end-to-end mobile applications security solutions and preventing customers from future potential threats.

HudsonNewsroom

Common Problems in Flender Gearboxes and How to Diagnose Them

The 5G Shift: How Next-Gen Connectivity Is Redefining Live Casino Gaming

IP Protection for MVPs and Early-Stage Products

Nicole shares her viewpoint about the current mobile app security that is currently witnessing incredible growth across Southeast Asia.

What is the importance of security for mobile apps?

Ms. Nicole Ban: I have been engaged in mobile application security for over 10 years across Asia, which included countries such as Japan, Taiwan, Hong Kong, India, and China. Recent developments since the start of the COVID pandemic have brought about incredible changes to how businesses, users, and governments interact and conduct in a more digitalized manner.

With the rapid development of the mobile Internet, mobile app security problems have become more and more prominent. It is reported that over 97% of mobile apps underwent security attacks, such as network penetration, malicious hijacking, personal privacy theft, reverse engineering and decompilation, code injection, browser hijacking, SMS hijacking, and the like. The security issue of mobile APPs has become an urgent problem to be addressed. It is also a matter of great concern to the state, society, enterprises, institutions, and individuals.

Here I would like to mention that insecure data storage also affects more than 76% of the applications and it has become quite difficult to protect data from unauthorized access. Basically, the greater chances of data breaches with mobile applications are because hackers seldom need to physically access anything to steal the personal or sensitive information of the users and company.

Why do Mobile APPs suffer more security vulnerabilities than web platforms?

At present, the supervision of mobile apps is still in the short-term mobilized stage, and the available supervision methods are scant. As a result, the problems such as content violations, unauthorized data collection, security vulnerabilities, and malicious behaviors are becoming increasingly serious. As for the PC Internet, the supervision mechanism has been mature. For example, if you want to launch a website, you need to file with the regulatory agency and apply for an ISP certificate or ICP certificate. However, for mobile apps as the mainstream mobile portal, a unified filing management mechanism is still absent.

According to statistics from PwC, as early as 2014, Asian mobile Internet had seen explosive growth, with the annual transaction volume exceeding 7 trillion US dollars.

However, what accompanies the huge opportunities and benefits of the mobile Internet is huge risks.

When everyone puts their eyes on the high yield, they tend to ignore a big issue, that is, the security of mobile apps. Mobile apps suffer more security vulnerabilities than web platforms. This may be due to the following reasons.

1. Insufficient security development experiences.

2. Low time and economic investment in application security.

3. Lack of application security developers.

4. Poor awareness of application security in developers and companies.

Will you please share some mobile application security tips so that the common users will be able to secure the mobile app from viruses and malware?

Yes, definitely I want to share some mobile security tips so that the users will be able to implement them to keep all their data safe.

Tip number 1:

This is for mobile app developers. Whenever you create any mobile application, it is very important to go through all the components on an individual basis and check out the security for each one. Moreover, you should also consider using network access control so that unfamiliar users are not able to send bulk traffic to the application and cannot put the security of the app in danger.

Tip number 2:

Automation is the way forward in mitigating potential threats to mobile applications. By reducing manual processes in vulnerability management and eliminating the human factor, companies can focus on security research. Automation is not a new concept in the cybersecurity industry. Automated vulnerability scanning has been available for over two decades. However, it was limited to static scanning. More recently, dynamic techniques have been used to enhance the level of automation in the assessment of application vulnerabilities. This allows for faster results, fewer false positives, and better detection of actual issues versus potential issues.

Tip number 3:

Mobile applications must be created by utilizing the complex coding options that become difficult for hackers to break into. Moreover, the applications should be designed in such a way that they store minimum information and use only the required data instead of collecting bulk information. By following these measures, businesses can protect their business from cyber-attacks and in the long run build a strong security system. Software updates must be completed with caution. A number of companies have been recently attacked because they ignored crucial software updates, which rendered them vulnerable to malware attacks. In order to prevent such incidents from happening, mobile applications should be updated only when required.

What kind of encryption do you think should be used in mobile apps?

It is no secret that mobile applications must be fully encrypted, however, I’d recommend the advanced encryption standard (AES) which is the widely accepted encryption for mobile apps. Most people use Android phones, download applications in them and recent studies have clearly revealed that Android is the most frequently attacked platform so whenever someone downloads the applications in Android, he or she must consider the complete encryption and also apply some level of data ciphering.

There is not a single way to encrypt data, instead, there are hundreds of different ways of utilizing the feature of encryption and combining it with different algorithms. If you do not have any detailed knowledge on how to check the level of encryption and what kind of encryption is used for your mobile application, you should reach out to the companies like ours where our team of experts will guide you in detail and solve all the security-related issues.

The root of the problem is that most people do not even know the potential issues they can face when the information gets exposed through mobile applications such as banking applications. It is something all businesses, as well as customers, should consider. The good news is that nowadays various free tools or app security testing are available which will tell you the level of safety of the particular mobile application.

Why does the security of mobile applications need to be improved?

Relative to web platforms, the security of applications needs to be improved. The research on web security has lasted for a dozen years, but little attention was paid to application security until recent years. Accordingly, the experience in application security development is insufficient. Besides, many companies only care about the functionality of applications and ignore their security. So, they are unwilling to invest their human and financial resources in application security, leading to many security vulnerabilities.

The mobile Internet has the features of boundary ambiguity, operating system openness, and incredibility of mobile terminals. These features bring about many security challenges and threats to mobile applications when they are released on the Internet for operation, such as static cracking, dynamic attacks, data theft, business threats, performance reduction, and operation collapse.

 

Therefore, sufficient attention shall be paid to application security. To ensure apps security, multi-layer security solutions are necessary. According to the nature of apps and the system platforms, multiple encryption methods may be used at the same time.

How does your platform SecIron provide security for the apps?

At SecIron, we solve top mobile app security issues such as insecure communication, lack of input validation, insecure data storage, poor encryption, content violations, application reverse engineering, unauthorized debugging, root device detection, hacking tools, and malicious behavior detection, and so on.

We understand that In-App protection is crucial to preserve and improve business reputation. When mobile applications are attacked, businesses observe irreversible consequences. This is because when the user data is stolen, the customers become over conscious about their security and privacy and leave the business. As a result, the businesses face a severe risk of regulatory compliance violations and bad publicity. If the business fails to overcome the vulnerabilities in the mobile applications and the attack lasts for a long time, it can cause irreparable damage to the business.

Our vision is to become Asia’s number one mobile app security provider and ensure the success of the businesses.

We are currently providing the services from two locations:

  • Our headquarters based in Tokyo, Japan
  • Our regional Southeast Asia branch located in Kuala Lumpur, Malaysia

We ensure the production of mobile applications from the invasions of hackers using cutting-edge security solutions and playing our part in making the online world a safer and secure place.

We mainly cover the mobile applications of the businesses such as:

  • IoT Industry.
  • Public Services.
  • SaaS industry.
  • Mobile gaming.
  • Retail & eCommerce.
  • Financial industry.
  • Healthcare industry.
  • Utility industry.

According to a survey, more than 75% of mobile applications will fail basic security tests. So we focus on the need for tracking the mobile application security and utilization of encryption Technology. In this way, employees and customers can remain safe while downloading the mobile applications and using them by following a complete mobile application security checklist.

Ryan Offman

Ryan Offman

Technology Reporter

More from HW Newsdesk

Common Problems in Flender Gearboxes and How to Diagnose Them
Technology

Common Problems in Flender Gearboxes and How to Diagnose Them

October 9, 2025
The 5G Shift: How Next-Gen Connectivity Is Redefining Live Casino Gaming
Technology

The 5G Shift: How Next-Gen Connectivity Is Redefining Live Casino Gaming

October 9, 2025
IP Protection for MVPs and Early-Stage Products
Technology

IP Protection for MVPs and Early-Stage Products

October 8, 2025

HW Newsroom

Exploring the World of Live Casino Gaming
Lifestyle

All About Golden Crown Casino for Australian Players: A Detailed Guide

by Craig Richer
October 7, 2025

Introduction Craving the thrill of the casino from the comfort of your couch? Golden Crown might just be your ticket....

Brief Introduction to BananaBotcrypto

Brief Introduction to BananaBotcrypto

October 7, 2025
Gulf Coast Western Reviews Show Consistent Partner Retention Through Transparent Energy Investment Approach

Gulf Coast Western Reviews Show Consistent Partner Retention Through Transparent Energy Investment Approach

October 6, 2025
Top 10 Book Ghostwriting Services

Top 10 Book Ghostwriting Services

October 5, 2025
Special Occasion Dresses That Steal the Spotlight

Special Occasion Dresses That Steal the Spotlight

October 4, 2025
The Difference Between Car and Truck Accident Claims

The Difference Between Car and Truck Accident Claims

October 3, 2025
The Naginata: From Samurai Battlefield to Women's Art

The Naginata: From Samurai Battlefield to Women’s Art

October 2, 2025
The ABCs of Live Casinos: How to Approach Them Like a Savant

The ABCs of Live Casinos: How to Approach Them Like a Savant

October 2, 2025
Kelsi Mayne Solidifies Her Spot as Country’s Next Big Thing With ‘Someone Who Knows’

Kelsi Mayne Solidifies Her Spot as Country’s Next Big Thing With ‘Someone Who Knows’

October 1, 2025
Identifying And Preventing Termite Infestations In Residential Homes

Identifying And Preventing Termite Infestations In Residential Homes

October 1, 2025
SaudiDialect.com Brings Saudi Arabic Dialect Learning to Global Audience

SaudiDialect.com Brings Saudi Arabic Dialect Learning to Global Audience

September 30, 2025
The Best Ways to Stay Healthy With a Busy Family

The Best Ways to Stay Healthy With a Busy Family

September 30, 2025
No Result
View All Result

Headlines

Hezi Badnany: A Global Healer Bringing Ancient Energy Medicine to Modern New York

The Future of Lashes: How Tatiana Kisliuk Is Leading the Lift Movement

Why Website Design and SEO Must Work Together

All About Golden Crown Casino for Australian Players: A Detailed Guide

Brief Introduction to BananaBotcrypto

Gulf Coast Western Reviews Show Consistent Partner Retention Through Transparent Energy Investment Approach

Trending

The 5G Shift: How Next-Gen Connectivity Is Redefining Live Casino Gaming
Technology

The 5G Shift: How Next-Gen Connectivity Is Redefining Live Casino Gaming

by Craig Richer
October 9, 2025

Live dealer games have always walked a fine line between old-world charm and modern convenience. They bring...

IP Protection for MVPs and Early-Stage Products

IP Protection for MVPs and Early-Stage Products

October 8, 2025
Hezi Badnany: A Global Healer Bringing Ancient Energy Medicine to Modern New York

Hezi Badnany: A Global Healer Bringing Ancient Energy Medicine to Modern New York

October 8, 2025
The Future of Lashes: How Tatiana Kisliuk Is Leading the Lift Movement

The Future of Lashes: How Tatiana Kisliuk Is Leading the Lift Movement

October 8, 2025
How to Sell a Business Without Regrets: Avoid These Common Mistakes

Why Website Design and SEO Must Work Together

October 7, 2025
  • 4 Challenges in Professionalizing Skilled Trades – and What Financial Markets Should Notice

https://marketsherald.com/4-challenges-in-professionalizing-skilled-trades-and-what-financial-markets-should-notice/

#nyc #losangeles #chicago #houston #phoenix #philadelphia #sandiego #dallas #sanfrancisco #seattle #denver #washingtondc #boston #detroit #vancouver #toronto #publicrelations #marketingagency #earnedmedia #editorial #marketing #guestpost #guestposting #sponsored #sponsoredpost #barberschool
  • IP Protection for MVPs and Early-Stage Products

https://hudsonweekly.com/ip-protection-for-mvps-and-early-stage-products/

#nyc #losangeles #chicago #houston #phoenix #philadelphia #sandiego #dallas #sanfrancisco #seattle #denver #washingtondc #boston #detroit #vancouver #toronto #publicrelations #marketingagency #earnedmedia #editorial #marketing #guestpost #guestposting #sponsored #sponsoredpost #cybersecurity
  • IP Protection Mistakes Startups Make—And How to Avoid Them Using Instant IP

https://ritzherald.com/ip-protection-mistakes-startups-make-and-how-to-avoid-them-using-instant-ip/

#nyc #losangeles #chicago #houston #phoenix #philadelphia #sandiego #dallas #sanfrancisco #seattle #denver #washingtondc #boston #detroit #vancouver #toronto #publicrelations #marketingagency #earnedmedia #editorial #marketing #guestpost #guestposting #sponsored #sponsoredpost #cybersecurity
  • Kabir McNeely’s Standout Supporting Role Shines in Fallaway — A Raw Exploration of Queer Love Premiering at The Roxie

https://ritzherald.com/kabir-mcneelys-standout-supporting-role-shines-in-fallaway-a-raw-exploration-of-queer-love-premiering-at-the-roxie/

#nyc #losangeles #chicago #houston #phoenix #philadelphia #sandiego #dallas #sanfrancisco #seattle #denver #washingtondc #boston #detroit #vancouver #toronto #publicrelations #marketingagency #earnedmedia #editorial #marketing #guestpost #guestposting #sponsored #sponsoredpost #arts #theatre
  • Balancing Wealth, Well-Being, and Legacy: Insights From Cindy Giovacchino

https://madisongraph.com/balancing-wealth-well-being-and-legacy-insights-from-cindy-giovacchino/

#nyc #losangeles #chicago #houston #phoenix #philadelphia #sandiego #dallas #sanfrancisco #seattle #denver #washingtondc #boston #detroit #vancouver #toronto #publicrelations #marketingagency #earnedmedia #editorial #marketing #guestpost #guestposting #sponsored #sponsoredpost #wellness
  • The Family Tracking Paradox: How New Yorkers Navigate Safety and Privacy in the Age of Location Apps

https://marketsherald.com/the-family-tracking-paradox-how-new-yorkers-navigate-safety-and-privacy-in-the-age-of-location-apps/

#nyc #losangeles #chicago #houston #phoenix #philadelphia #sandiego #dallas #sanfrancisco #seattle #denver #washingtondc #boston #detroit #vancouver #toronto #publicrelations #marketingagency #earnedmedia #editorial #marketing #guestpost #guestposting #sponsored #sponsoredpost #cybersecurity
  • EVÉN: Redefining Modern Luxury With Minimalist Handbag Design

https://ritzherald.com/even-redefining-modern-luxury-with-minimalist-handbag-design/

#nyc #losangeles #chicago #houston #phoenix #philadelphia #sandiego #dallas #sanfrancisco #seattle #denver #washingtondc #boston #detroit #vancouver #toronto #publicrelations #marketingagency #earnedmedia #editorial #marketing #guestpost #guestposting #sponsored #sponsoredpost #handbag #fashion
  • Brian Quinn’s Transition From FDNY Firefighter to Impractical Jokers Star

https://marketsherald.com/brian-quinns-transition-from-fdny-firefighter-to-impractical-jokers-star/

#nyc #losangeles #chicago #houston #phoenix #philadelphia #sandiego #dallas #sanfrancisco #seattle #denver #washingtondc #boston #detroit #vancouver #toronto #publicrelations #marketingagency #earnedmedia #editorial #marketing #guestpost #guestposting #sponsored #sponsoredpost #television

© 2025 The Hudson Weekly. Published by The Ritz Herald. Editions: Markets Herald • Lincoln Citizen • Madison Graph • Belmont Star • Fairmont Post

Address: 1177 6th Avenue, 5th Floor, New York, NY 10036. Removals: pr@hudsonweekly.com. Phone: (718) 313-5252. M-F: 9AM-5PM. Privacy Policy

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Financial
  • Blockchain
  • Technology
  • Entertainment
  • Lifestyle
  • Arts
  • Health
  • Sports
  • Cybersecurity

© 2025. The Hudson Weekly