Frank Jablonski

View all posts from Frank Jablonski on the Progress blog. Connect with us about all things application development and deployment, data integration and digital business.

Articles by the Author

Top 5 Types of Mobile Device Breaches
Mobile devices are one of the weakest links in cyber security for businesses, yet very little is being done to mitigate the risks around these top 5 types of mobile device breaches.
The Biggest Security Risks of Using 3rd Party APIs
Businesses have steadily improved their perimeter security to better protect against an ever increasing number of cyber attacks. This has left hackers to look for other, less challenging paths to an enterprise’s data in 3rd party APIs.  
Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation