Why the retail industry needs to rethink identity [Q&A]


The retail industry continues to be a top target for cyber criminals, retailers rely heavily on digital infrastructure to manage consumer data and operations so they remain an attractive target for attackers seeking financial or operational disruption.
The cyberattacks earlier this year hitting UK retail (Marks & Spencer, Co-op, Harrods) are the latest reminder that identity is still one of the weakest links.
Dirty data and why it’s a problem for business [Q&A]


Organizations are sitting on troves of information yet struggle to leverage this data for quick decision-making. The challenge isn't just about having data, but working with it in its natural state -- which often includes ‘dirty data' not cleaned of typos or errors.
We spoke to CEO of analytics company WisdomAI, Soham Mazumdar, to find out more about this challenge and how businesses can deal with it.
How ‘confidential computing’ can add trust to AI [Q&A]


Artificial intelligence is finding its way into more and more areas of our lives. But while there are concerns around the use of the technology itself, there are much greater ones over how we secure it.
We spoke to Anand Kashyap, CEO and founder of Fortanix, to discuss confidential computing, a technology backed by Microsoft, Intel, Arm, AMD and Nvidia, which encrypts data while it's being processed, even by AI systems.
Responding to the challenge of deepfakes [Q&A]


Recent advancements in publicly available AI models have made it incredibly easy to generate deepfakes -- so much so that attackers don’t need to be technical experts to pull off convincing deception campaigns.
Attackers can scrape public content to recreate someone's voice or face, and inject that fake identity into virtual meetings, phone calls, or even training videos.
The challenge of syncing virtual economies across platforms [Q&A]


As people increasingly demand seamless experiences across platforms, developers face growing complexity in managing unified virtual economies.
In the games sector in particular companies need to leverage distributed architecture, virtual currencies, and real-time inventory reconciliation to ensure consistent user experiences and secure transaction flows.
Rethinking AppSec for the AI era [Q&A]


The application security landscape has always been a complex one and can lead to teams spending too much time hunting down vulnerabilities. With AI becoming more popular there are even greater risks to consider.
We spoke to Yossi Pik, co-founder and CTO at Backslash Security, to discuss how AppSec needs to adapt to the greater use of AI.
Securing Kubernetes in the enterprise [Q&A]


As more organizations scale up containerized workloads they’re also facing increasing security and compliance challenges.
Kim McMahon part of the leadership team at Sidero Labs to discuss the vulnerabilities enterprises are encountering when scaling up Kubernetes on traditional operating systems and what they can do to counter them.
Why one-time security assessments are no longer sufficient [Q&A]


With cyber threats becoming more numerous and ever more sophisticated, it’s becoming more critical than ever for organizations to prioritize targeted threats, optimize their existing defensive capabilities and proactively reduce their exposure.
One-time security assessments are looking increasingly inadequate. We spoke to CyberProof CEO Tony Velleca to discuss how organizations can effectively implement a Continuous Threat Exposure Management (CTEM) strategy to improve their protection.
Why the traditional SOC model needs to evolve [Q&A]


The security operations center (SOC) has long relied on traditional SOAR platforms to manage incidents, but today’s threat landscape is moving too fast for rigid, static approaches. As attackers use AI to evolve their tactics, security teams need smarter, more adaptive systems to keep up.
We spoke to Tom Findling, co-founder and CEO of Conifers.ai, about how AI-powered SOC platforms are helping organizations scale their defenses, improve threat detection, and move from reactive alert management to proactive risk reduction.
How do you know if you’re dealing with a human or a bot? [Q&A]


If you’ve seen ‘Blade Runner’ you’ll know how difficult it can be to determine if someone is human or not. While that was fiction it’s worth remembering that it was set in 2019.
In 2025 and in the real world it’s becoming increasingly difficult to tell humans from bots in the online world. AI-powered bots, nearly indistinguishable from humans, are multiplying rapidly. This presents a growing nightmare for headhunters, security officers and more. We spoke to Terence Kwok, founder and CEO of blockchain identity platform Humanity Protocol, about the challenge of verifying humanity online.
Maximizing value from Microsoft 365 [Q&A]


Many organizations have now adopted Microsoft 365 as a central part of their office service provision. But are they getting the most out of the software that they’re paying for?
We spoke to Vadim Vladimirskiy, CEO of Nerdio, about how businesses can use more than just the big services and why it’s important to understand sizing and bolt-ons in order to extract maximum value from their M365 investment.
The challenge of moving AI from prototype to production [Q&A]


More organizations are turning to AI to assist in their digital transformation efforts, but many projects get stuck in the pilot phase.
That’s not necessarily a sign of failure though. Rather, it reflects that AI is still in its formative stage, with its most transformative impact still ahead. We spoke to Nadav Eiron, SVP of cloud engineering at Crusoe to learn more about how AI can transition from experimentation to integration, and from potential to permanence.
How AI is transforming customer service interactions [Q&A]


If you’ve contacted a company recently it’s more than likely that you have encountered some form of AI either online or over the phone.
We spoke to Priya Vijayarajendran, CEO of ASAAP to find out how AI is transforming real-time customer service interactions in the contact center, and what it means for the evolving relationship between humans and machines.
How the SOC is evolving to meet new threats [Q&A]


As cybersecurity threats grow more sophisticated and relentless, the role of the Security Operations Center (SOC) has never been more critical.
In response organizations are re-imagining their SOCs to address the dual challenges of an evolving threat landscape and a shifting workforce dynamic. We spoke to Scott Scheppers, chief experience officer at LevelBlue to find out more about this shift and how SOC teams are pivotal in safeguarding operations, fostering innovation, and mentoring the next generation of cybersecurity talent.
Dealing with the challenge of securing machine identities [Q&A]


Machine identities have proliferated in recent years, but while they offer convenience they also introduce new vulnerabilities.
We spoke to Ev Kontsevoy, Teleport CEO, to learm more about the problem of securing machine IDs and what enterprises can do to address it.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.