Cloud security and speed -- how fast do your processes need to be? [Q&A]


Moving to the cloud offers many benefits for businesses, but it doesn't remove the need to keep your systems secure. The tools that make the cloud fast and attractive for business can also be used by attackers.
We spoke to Anna Belak, director, Office of Cybersecurity at Sysdig to discuss the pain points that she sees security teams dealing with today, where those problems come from, and how to address them around process and skills rather than just looking at the tech side.
The dynamics of modern Windows device management [Q&A]


Despite Apple and Linux gaining ground in recent years Windows still commands over 50 percent of the endpoint desktop market.
This means that Windows device management is a key priority for enterprises. We spoke to Apu Pavithran, founder and CEO of Hexnode, to learn more about device management and how it can be used effectively.
Biometric bias and how to prevent it [Q&A]


As we move away from passwords to other forms of authentication, there's increasing reliance being placed on technologies like biometrics.
But there's growing evidence that this technology could be flawed, with facial recognition exhibiting higher error rates for those with darker skin for example. We spoke to Dr. Mohamed Lazzouni, CTO of Aware, to discuss the ethical issue of bias in biometrics and what needs to be done to prevent it.
How AI is having an impact on software testing [Q&A]


Artificial intelligence is making its way into many areas of the tech industry, with the introduction of large language models making it much more accessible.
One of the areas where it's having a big impact is software testing, where it allows companies to provide better support to existing software teams and refocus their efforts on development.
Why you should worry more about SaaS than generative AI [Q&A]


There's a lot of talk at the moment about how the use of AI opens up businesses to additional risk. But is AI itself the issue or is it the way in which it's integrated with other applications?
We talked to Ran Senderovitz, chief operating officer of Wing Security, to discuss how enterprises need to re-prioritize their security to address the real attack surface, the SaaS apps that leverage AI.
Is your zero trust program at risk of failure? [Q&A]


Zero trust is no longer a 'nice to have' for cybersecurity leaders. As organizations embrace hybrid and remote workforces, the volume of cyberattacks and data breaches involving unauthorized access to networks, applications and systems has surged.
In response, cybersecurity leaders are striving to adopt a zero trust approach to security to reduce the risk of data breaches, ransomware and insider threats. However, the success of these efforts are being undermined by a variety of factors.
Will the conversational web see the end of tech giants' app stores? [Q&A]


The rise of generative AI platforms like ChatGPT has brought us a step closer to a 'conversational web' where it's possible to find information and access services without needing an app.
This could potentially mean the end of app stores from the likes of Apple and Google and disrupt the whole app ecosystem.
Accepting generative AI into enterprise software development [Q&A]


The development community has been quick to embrace generative AI for its productivity potential. But at the same time it raises concerns for enterprises around IP/ownership, security, compliance and more.
We talked to Steve Martinelli, director of developer advocacy and community at Equinix, to discuss the similarities between GenAI and open-source software's acceptance journey, and how we might tackle the unique challenges it presents.
Malicious QR codes hide attacks in plain sight [Q&A]


With their ability to provide access to websites, enable mobile payments, and retrieve data, QR (quick-response) codes have become a ubiquitous part of our daily lives. In fact, In 2022, approximately 89 million smartphone users in the United States scanned a QR code on their mobile devices, a 26 percent increase compared to 2020.
However, cybercriminals are also using this trend to distribute malware, steal personal information, and conduct phishing attacks, which can then be leveraged to access your confidential corporate data. As consumers and even large enterprises continue to use QR codes as a means to streamline operations, it's important to be aware of the fast-growing attack surface that bad actors are jumping on.
How conversational AI is shaping customer service [Q&A]


Conversational AI has seen great advances and a massive increase in adoption in the last year or so such that it’s increasingly finding its way into our everyday lives.
We spoke to voice AI industry expert PolyAI's co-founder and CEO, Nikola Mrkšić, to discuss how the technology is shaping customer service and reducing costs, as well as where generative AI tools fit into the picture.
Enterprise cybersecurity's lateral movement 'blind spot' [Q&A]


A lot of time, attention, and investment is spent on creating strong perimeters and endpoint defenses to prevent malicious actors from gaining access to corporate networks.
While this is important, organizations also need a network security strategy -- because if attackers do infiltrate a network, the race is on to uncover the malicious activity and quickly resolve the incident.
Preparing for a post-quantum security landscape [Q&A]


As widely available quantum computing draws closer, organizations need to consider the extent to which their supply chain presents risks and start building in post quantum readiness to their risk assessments.
To do this, it's critical for businesses to understand the origin and authenticity of all the components that are in the supply chain (both hardware and software). This is especially true for IoT devices, which rely on systems and subsystems created by multiple partners and vendors bringing their solutions together to make a fully functioning connected product/system.
Which comes first? The pentest or the bug bounty program? [Q&A]


Bug bounty and penetration testing programs are often grouped as interchangeable, but they perform distinct functions.
To determine whether both deserve a place within a cybersecurity strategy, it is important to understand their specific qualities and how they have matured over recent years. We spoke to Chris Campbell, lead solutions engineer at HackerOne, to learn more.
Cyber fusion -- what is it and why is it important for security? [Q&A]


Today's IT security teams face several key challenges. Tasked with combating the rising volume and frequency of sophisticated cyber threats, they are bombarded with a tsunami of alerts generated by countless security tools that deliver little context or value-add insight.
Effectively processing and analyzing all this data to identify actionable threat intelligence requires considerable time and effort.
What can we expect from the third decade of cloud computing? [Q&A]


Cloud has been a cornerstone of the computing industry for many years. As it enters its third decade in 2024, economic pressures, anti-monopoly moves and more mean things will look different for hyperscale providers.
We spoke to Amol Dalvi, VP of Product of Nerdio, to discuss what we can expect to see over the next 10 years.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.