Advanced SOC Operations / CSOC , Governance & Risk Management , Professional Certifications & Continuous Training

How Mobile Is Changing the Security Landscape

Uniken CEO Bimal Gandhi on Addressing All the Risks
Bimal Gandhi, CEO, Uniken Inc.

The growing use of mobile devices is changing the security landscape, and protection must extend to the device, the application, the connection channel and the network entry point, says Bimal Gandhi, CEO at Uniken Inc.

See Also: SSH Study: U.S., U.K. and Germany Executive Summary

"The big challenge with securing the entire chain is the integration of all the pieces - hackers exploit the cracks in those elements," he says. "How do you deal with that in a meaningful way, at scale? The number of devices and the multiple ways in which this can happen in mobile changes the dimension of that risk to the enterprise, simply because of the number of devices that it can happen to."

In this video interview with Information Security Media Group, Gandhi also shares insights on:

  • Common pain-points for security practitioners when dealing with mobile;
  • How hackers are circumventing security measures;
  • The differences between the Asian security market and the global landscape.

Gandhi has over 20 years of experience in the management consulting, technology and financial services industries in the U.S., U.K. and India. He focuses on blending finance, strategy, technology and operations into a portfolio to drive performance via a strong focus on metrics.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.