Articles about Q&A

The importance of API monitoring across the enterprise [Q&A]

API

Over the past few years, technology teams have split into smaller work groups with more focused tasks. The rise of the cloud has created the need for DevOps teams, and the gap has grown wider between teams that build products and teams that manage products.

At the same time, applications have become dramatically more complicated. This has given rise to specialized site reliability engineers who are well-versed in monitoring all application components, including APIs. However, focusing API resilience in one team has allowed organizations to treat the symptoms rather than the underlying problem.

Continue reading

The EU Digital Markets Act and what it means for business [Q&A]

DMA and the flag of the european union displayed on a modern laptop

The Digital Markets Act (DMA) is aimed at ensuring a higher degree of competition in European digital markets. It seeks to prevent big companies from abusing their market power and allow new players to enter the market.

We spoke to Chris Hewish, chief strategy officer at video games commerce company Xsolla, to discuss the implications the DMA has on game developers and publishers, particularly in the context of digital distribution platforms, app stores, and online marketplaces.

Continue reading

Combating information overload with different data sources [Q&A]

Information overload

The majority of teams today are contending with too much data which means they struggle to generate meaningful insights from their information, and can become overwhelmed by the sheer volume.

We spoke to CallMiner CMO Eric Williamson who believes sourcing customer feedback from different sources might help solve the problem.

Continue reading

The challenges of securing Active Directory [Q&A]

AD Active Directory - Inscription on Green Keyboard Key.

Microsoft Active Directory is used by a majority of the world’s organizations. But Cyberattacks and misconfigurations targeting AD have surged in recent years, leading to critical outages and data loss.

We spoke to Bob Bobel, CEO of Cayosoft, about how to address critical weaknesses in enterprise infrastructure associated with Microsoft Directory services.

Continue reading

Why automation isn't the answer to zero-day attacks [Q&A]

Zero Day

Last year saw almost 100 zero-day attacks, putting a strain on security teams and becoming known as the 'Hot Zero-Day Summer.'

In response to these attacks, the first instinct of many organizations has been to turn to automation. But Marc Rubbinaccio, manager, compliance at Secureframe, doesn't believe that this is the right approach. We spoke to him to find out more.

Continue reading

How are CISOs coping with developer gatekeeping? [Q&A]

Security guard gatekeeper

CISOs are under the microscope to prove they can reduce vulnerabilities in the software development life cycle -- particularly, that they can do so from the start of code creation. As such, CISOs are searching for the most effective way to ensure the security awareness of their developers before they take on the responsibility of writing and introducing code.

Secure Code Warrior's co-founder and CTO, Matias Madou, believes that a 'gatekeeping' standard -- where developers are incrementally given access to more sensitive projects -- is the key to building a strong foundation for secure coding processes.

Continue reading

Why a 'Swiss cheese' approach is needed to combat deepfakes [Q&A]

Deepfake

Deepfakes are becoming more and more sophisticated, earlier this year a finance worker in Hong Kong was tricked out of millions following a deepfake call.

With the deepfake fast becoming a weapon of choice for cybercriminals, we spoke to Bridget Pruzin, senior manager -- compliance and risk investigations and analysis at Convera, to learn why she believes a 'Swiss cheese' approach, layering controls like unique on-call verification steps and involving in-person verification, is crucial to effectively defend against these scams.

Continue reading

The emerging trends that security teams need to address [Q&A]

Security

The world's critical national infrastructure remains on high alert. The National Cyber Security Centre in the UK and agencies in the US, Australia, Canada and New Zealand have all detailed how threat actors have been exploiting native tools and processes built into computer systems to gain persistent access and avoid detection.

We spoke to Chase Richardson, lead principal for cybersecurity and data privacy at Bridewell to discuss the critical trends and emerging dangers that cyber teams need to continue to watch out for?

Continue reading

Dealing with digital certificate vulnerabilities [Q&A]

Magnified certificare

While digital certificates are an essential part of day-to-day security they also present challenges. They can expire or be revoked, or even forged.

We spoke to Bert Kashyap, CEO of passwordless security platform SecureW2, to learn more about certificate-related vulnerabilities and what IT and security teams can do to deal with them effectively.

Continue reading

How GenAI is changing business and society [Q&A]

Artificial intelligence

Generative AI started out as a bit of a novelty, allowing you to create writing or artwork based on simple prompts. But increasingly it's having an impact on many areas of the world, from writing code to composing music and aiding research.

In a new book, Generative AI in Practice: 100+ Amazing Ways Generative Artificial Intelligence is Changing Business and Society, futurist and thought leader Bernard Marr takes a closer look at the impact of GenAI. We talked to him to find out more.

Continue reading

The essential role of an open data stack in building an open lakehouse [Q&A]

Data Lakehouse - Inscription on Blue Keyboard Key.

There is a movement underway to bring about a set of intelligent data apps that will require a new type of modern data platform to support them. TheCube Research identifies this as the 'Sixth Data Platform' -- an open, multi-vendor, modular platform.

We spoke to Justin Borgman, co-founder and CEO of Starburst, who believes an Icehouse architecture is the ideal foundation for building an open data lakehouse, underpinned by flexibility and open technologies.

Continue reading

Why we need to change how we understand cyber risk [Q&A]

Cybersecurity is a high priority for organizations, yet often they're unsure if they're focusing their effort in the right places, and spending too much or too little on protecting themselves.

Robin Oldham, CEO of Cydea, believes current methods of understanding cyber risk are outdated and misrepresent risk and lead to misunderstandings that only promote fear, uncertainty and doubt. We spoke to him to find out what can be done to change this mindset and approach.

Continue reading

Using DMARC with Office 365 and G Suite [Q&A]

email DMARC

New email rules from major providers mean that businesses need to adopt the DMARC standard in order to ensure that their emails get delivered.

But while the new rules have received a good deal of publicity there hasn't been much attention paid to those not running their own mail server and relying on a third-party mail services.

Continue reading

How AI is transforming sport [Q&A]

Robot arm putting golf ball on tee as caddy or player with fairway green background. Sport athletic and technology concept. 3D illustration rendering

A new survey from IBM and Morning Consult polled over 18,000 global sports fans to discover the ways in which people follow and engage with their favorite sports are evolving

It finds a growing generational shift in preferences -- including embracing technologies like AI in areas such as augmented reality, recruiting, and fan engagement.

Continue reading

Facing the security challenge of quantum computing [Q&A]

Quantum network security

Now that we're beginning to overcome the obstacles to creating a commercially viable quantum computer it's important to consider the security threat that these vastly more powerful machines will pose.

Not least of these is the threat to encryption which puts everyone's online security at risk. We spoke to Nils Gerhardt, chief technology officer and head of product for Utimaco, to explore what a post-quantum future may look like.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.