Blog
A Guide to Android Keystore and Hardware-Backed Cryptography
34 minute read | April 28, 2026Quick jump Use these links to jump to sections of the blog that are of particular interest to you. The blog proper starts afterwards. Should I use the Android Keystore? How do I check Android Keystore support on the user’s device at runtime? How do...
Read more
3 min read
| April 21, 2026
Protecting Financial Services Embedded in Mobile Apps
Protection
Financial services
Dexguard
Threat monitoring
Thought leadership
4 min read
| April 14, 2026
Ensuring Fair Play and Profitability in Mobile Games with App Security
Android
iOS
Dexguard
iXGuard
Thought leadership
5 min read
| April 7, 2026
From Keep Rules to Guided Configuration
Android
Technical
Dexguard
6 min read
| March 31, 2026
Can Your App Survive Coruna and DarkSword iOS Exploits?
iOS
Technical
4 min read
| March 24, 2026
The Problem with One-Size-Fits-All Security and How to Fix It
Technical
Threatcast
Threat monitoring
Thought leadership
General
8 min read
| March 17, 2026
Building Resilient Mobile APIs in a Hostile Environment
Technical
App Security Testing
Protection
Security research
4 min read
| March 10, 2026
Real-Time Threat Monitoring in Modern Mobile App Protection
Android
iOS
Protection
Threatcast
Threat monitoring
6 min read
| March 3, 2026
Mobile Healthcare App Integrity Is Now a Patient Safety Issue
Protection
Healthcare
Security testing
Compliance
Thought leadership
4 min read
| February 24, 2026
Automating Guardsquare Workflows with Bitrise
Technical
AppSweep
Dexguard
iXGuard
A Guide to Android Keystore and Hardware-Backed Cryptography
https://www.guardsquare.com/blog/android-keystore
Protecting Financial Services Embedded in Mobile Apps
https://www.guardsquare.com/blog/protecting-financial-services-embedded-in-mobile-apps
Ensuring Fair Play and Profitability in Mobile Games with App Security
https://www.guardsquare.com/blog/how-to-ensure-fair-play-for-mobile-games-guardsquare
From Keep Rules to Guided Configuration
https://www.guardsquare.com/blog/keep-rules-to-guided-configuration
Can Your App Survive Coruna and DarkSword iOS Exploits?
https://www.guardsquare.com/blog/coruna-ios-exploit
The Problem with One-Size-Fits-All Security and How to Fix It
https://www.guardsquare.com/blog/one-size-fits-all-security
Building Resilient Mobile APIs in a Hostile Environment
https://www.guardsquare.com/blog/building-mobile-api-security
Real-Time Threat Monitoring in Modern Mobile App Protection
https://www.guardsquare.com/blog/real-time-threat-monitoring
Mobile Healthcare App Integrity Is Now a Patient Safety Issue
https://www.guardsquare.com/blog/mobile-healthcare-app-integrity
Automating Guardsquare Workflows with Bitrise
https://www.guardsquare.com/blog/automate-workflows-with-bitrise


