Application Security , Enterprise Mobility Management / BYOD , Next-Generation Technologies & Secure Development

The Mobile Application Security Quandary

Aligning Mobile App Dev to Security and Compliance
John Aisien, CEO, Blue Cedar

The need for enhanced mobile application security is being driven by increasingly powerful mobile devices and the ubiquitous availability of bandwidth, says John Aisien of Blue Cedar.

See Also: Webinar | The Future of Adaptive Authentication in Financial Services

"Enterprise computing is not only moving to the cloud at an amazing pace, but some of that compute is also moving to the edge - and the mobile device is by far the most ubiquitous edge device there is," he says.

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Aisien discusses:

  • The factors driving mobile app security;
  • The need for deeper security integration in mobile apps;
  • Predictions for app security in 2019.

Aisien is CEO of Blue Cedar. He previously served as COO at Mocana, responsible for the mobile business. Prior to that, he was global product manager for Oracle's Fusion middleware. He also ran product, marketing and business development for Thor, a pioneer in identity management, which was acquired by Oracle.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.