Casey Dunham is a Portland, ME.-based application developer, headed to ShmooCon to learn more about the art of mobile app security…Me: What are the big challenges you deal with as an application developer?Casey: My concern is about getting everyone on the same page. I can’t test every new application for vulnerabilities on my own. There’s simply no time to write AND test it all. The quality assurance guys can’t test it all on their own, either. My latest company takes security pretty seriously, but I’m always working on ways to improve the quality of security while keeping the development process moving along.Me: What are you hoping to find at ShmooCon that’ll help you better serve your company? Casey: I’ll attend the app security talks, but these conferences are an opportunity to expand my horizons, so I’ll also go to talks that deal with areas I don’t typically work on, like mobile security. Mobile app development is something I don’t do at all right now. It’s completely out of my comfort zone, so I want to learn more about it.–Bill Brenner Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe