Articles about Q&A

What can we expect from the third decade of cloud computing? [Q&A]

Cloud has been a cornerstone of the computing industry for many years. As it enters its third decade in 2024, economic pressures, anti-monopoly moves and more mean things will look different for hyperscale providers.

We spoke to Amol Dalvi, VP of Product of Nerdio, to discuss what we can expect to see over the next 10 years.

Continue reading

Logs, metrics and traces -- unlocking observability [Q&A]

Ensuring observability has always involved three pillars: logs, metrics and traces. However, the reality is that most organizations simply store this information in silos which are incapable of communicating with one another.

Jeremy Burton, CEO of Observe, believes organizations need to go beyond the three pillars of past failed solutions and instead view observability as purely a data problem. We talked to him to learn more.

Continue reading

Bridging the gap between development and security teams [Q&A]

Couple with laptops

Friction and lack of communication between development and security teams can lead to problems in software development and testing.

How can we bridge the gap between developer and security teams and help them see that they have common goals? We spoke to Scott Gerlach, CSO and co-founder of StackHawk, the company making web application and API security testing part of software delivery, to find out.

Continue reading

Dealing with the rise of hybrid and remote working [Q&A]

remote working, telecommuting

The pandemic led to a dramatic shift in working patterns with many more people working from home or spending less time in the office.

Recently though we've been seeing more calls for staff to go back to the office. So, have working patterns changed for good and if so how can productivity levels be maintained with remote working? We talked to Mark Cresswell, co-founder and executive chairman of Scalable Software, to find out.

Continue reading

Is there a better way of protecting your digital life? [Q&A]

The nature of the modern world means that we all have lots of different accounts to manage various services.

Protecting all of these can be a challenge and you can end up with lots of different tools like password managers, VPNs, anti-virus tools and more. It also leads to people getting lazy and reusing passwords.

Continue reading

Are we being failed by DevSecOps? [Q&A]

Over the years, security vendors have pushed companies to integrate their tools into the DevOps pipeline with the promise of being able to move faster and be more secure.

However, as businesses have matured their DevSecOps practices the more they have been hit by mountains of reported vulnerabilities and problems that have slowed them down. So, has DevSecOps failed in its promise? We talked to Eitan Worcel, CEO at Mobb, to find out.

Continue reading

The growing trend in cyberattacks against the aviation industry [Q&A]

Towards the end of last year the American Airlines pilot union was hit with a ransomware attack. This is just one of a growing number of attacks targeting the aviation sector.

What makes the aviation industry such an attractive target and how can it protect itself? We spoke to Marty Edwards, deputy CTO for OT/IoT at Tenable, to find out.

Continue reading

OpenTelemetry -- what is it and why does it matter? [Q&A]

When OpenTelemetry was first released in 2019, there was a good deal of excitement about the prospect of a single standard set of telemetry data for the entire modern software stack.

OpenTelemetry set out to make robust, portable telemetry a built-in feature of cloud-native software, and give developers and platform engineers a common mental model for all the telemetry types.

Continue reading

How IBM is supporting developers with AI education [Q&A]

In May of last year, IBM launched watsonx, its enterprise-ready AI and data platform, and made it generally available in July.

Alongside this it has launched some new free generative AI educational courses and content to help developers and IT practitioners build their AI and open source skills. We spoke with Savio Rodrigues, vice president, ecosystem engineering and developer advocacy at IBM to learn more.

Continue reading

How the use of mobile devices is changing the cybersecurity landscape [Q&A]

As consumers and businesses undergo a sea change shift towards mobile interfaces, embracing everything from retail to human resources management, the landscape of mobile security is experiencing a parallel transformation.

With this surge in reliance on mobile devices, threats have become more sophisticated, spanning network vulnerabilities, the proliferation of malware, and the craftiness of phishing schemes.

Continue reading

Why use of Apple devices is growing in the enterprise [Q&A]

The use of Apple devices in the enterprise has increased in recent years. But what's behind this trend and how much impact is it having?

We spoke to Weldon Dodd, SVP of community at Apple device management and security specialist Kandji, to discover how Apple has become a strategic choice for businesses, leading to increased employee productivity and even additional revenue opportunities.

Continue reading

The evolving roles of the CIO and CISO [Q&A]

The relationship between an organization's chief information officer (CIO) and chief information security officer (CISO) has traditionally been somewhat at odds, since CIO's job is built around sharing information and the CISO's job is to secure it. Plus, the CIO was normally higher in the organizational hierarchy, which could also cause some tension.

But the relationship has evolved in recent years, to the point where the two positions are often more on par with each other. And with security's growing importance to the business (and the boardroom), the two jobs often share the same goals and responsibilities.

Continue reading

How to prepare for the new PCI DSS 4.0 requirements [Q&A]

The Payment Card Industry Data Security Standard (PCI DSS) turns 20 next year and has remained largely unchanged during that time. But version 4.0, due to become mandatory from April 2024, will bring the standard bang up-to-date and usher in a number of big changes.

We spoke to Phil Robinson, principal consultant and QSA at Prism Infosec, to explore what's changing and how organizations can prepare to meet the new requirements.

Continue reading

Unlocking business potential through outcome-based security [Q&A]

Traditionally, organizations have focused on measuring the results of their cyber security strategies in terms of threat events or security incidents to determine how effective their security controls are.

However, in today's fast-paced world, the real game-changer is aligning security outcomes with business objectives and this is where 'outcome-based security' plays a huge role. It's a shift in focus for organizations, but one which can empower security teams to add even greater value to the strategic goals of the business.

Continue reading

What enterprises need to know about cybersecurity compliance [Q&A]

Just as cybersecurity threats are constantly evolving, so are the compliance regulations that organizations must follow. And as these regulations tighten so the risks of non-compliance become higher.

Cam Roberson, VP at Beachhead Solutions, a provider of cloud-managed PC and mobile device encryption, security, and data access control, sat down with us to discuss what enterprises need to know about the current state of cybersecurity compliance.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.