Articles about Q&A

Exploring how AI-powered chatbots are changing the business world [Q&A]

Artificial intelligence

Thanks to high-profile tools like ChatGPT, we've witnessed AI appearing in more and more areas and projects this year. Next week sees the launch of the latest Chatbot Summit, held at ExCel London on October 11-12, bringing together industry experts to share practical skills, knowledge, and insights.

We spoke with Chatbot Summit 2024 founder and executive chairman, Yoav Barel, to discuss the impact of AI technology and how businesses can prepare, as well as what summit attendees can expect from the event.

Continue reading

Why digital transformation is key to managing supplier relationships [Q&A]

Digital transformation

Digital transformation doesn't just affect your own business, it has a major influence on your relationships with suppliers and partners too.

We talked to Dan Amzallag, COO at Ivalua, to discuss the impact of digital transformation on the supplier ecosystem and procurement processes.

Continue reading

The impact of evolving AI in cybercrime [Q&A]

Artificial intelligence (AI) has been an evolving trend at the very center of cybersecurity in recent years. However, the release of a wave of new tools such as ChatGPT and Microsoft's Jasper chatbot have sparked fresh concerns about the potential for cybercriminals to leverage increasingly sophisticated technologies for nefarious purposes.

We spoke to Zach Fleming, principal architect at Integrity360, to explore whether AI can be used to create sophisticated malware and hacking tools capable of bringing down entire networks. We'll consider which concerns are valid by highlighting the current state of AI, and we'll explore how security teams can best combat the use of AI in cybercrime.

Continue reading

What's driving the need for cybersecurity in ESG [Q&A]

ESG

Environmental social and governance (ESG) policy sees businesses seek to implement ethical practices to safeguard, not just the business, but its ecosystem of partners and customers and the wider world.

We spoke to Tim Wallen, regional director for the UK, US and emerging markets at Logpoint, to discuss the reasons why cybersecurity needs to be incorporated into ESG reporting, and how this can be achieved.

Continue reading

Why bad bots and open banking are creating opportunities for cybercriminals [Q&A]

We all know that bad bots are, well… Bad. But open banking is supposed to be good, giving consumers more control over their finances. Combine open banking and bad bots though and you have opened up a world of new threats to banks, customers, and their data.

We spoke to Alan Ryan, AVP for UK and Ireland at Imperva, about how open banking has created new opportunities for cybercriminals, and why the traditional siloed approach to security needs re-appraising.

Continue reading

The battle for control of cloud environments [Q&A]

Cloud

Lack of control has long been a pain point for developers in cloud computing, especially with the market dominated -- and controlled -- by a few large providers.

What's likely to happen as developers' desire for control meets the hyperscalers' desire to keep companies locked into their platforms? We spoke to Billy Thompson, solutions engineering manager at Akamai, to find out.

Continue reading

The rise in mobile device security threats and the growing attack surface [Q&A]

Both government agencies and corporations are being tasked with developing strategies for protecting mobile devices from an increasing wave of attacks. CISOs and business leaders are asking themselves not only how they can use mobile devices to make employees more productive, but also how to realize the full potential of a mobile-powered business.

As leaders execute their mobile-powered businesses, they will also need to parallel these initiatives with mobile-first security strategies to address the fast-growing attack surfaces that bad actors are increasingly jumping on. We spoke to Shridhar Mittal, CEO of Zimperium to discover more.

Continue reading

Is banning the right solution to dealing with problem apps? [Q&A]

Lots of apps are potentially transmitting and saving user data without express permission and this has led some administrations to consider bans.

In May, Montana passed the first bill to ban TikTok statewide due to data concerns, and India has banned 60 apps, including TikTok, claiming they were transmitting user data back to China.

Continue reading

Does the password still have a future? [Q&A]

Password on a sticky note

The death of the password has been predicted for a long time, yet despite increased adoption of biometrics, passkeys and other newer technologies, passwords still underpin much of our day-to-day security.

We spoke to Darren James, senior product manager at Specops Software, to discuss passwords, whether they still have a future and where authentication is heading.

Continue reading

Why it's critical to have an incident response plan [Q&A]

Recent research carried out by IBM found that organizations with regularly tested incident response plans had a $2.66 million lower data breach cost than organizations without them.

We spoke to Adam Scamihorn, product director at InterVision, to find out why every enterprise needs to have a strong incident response plan in order to face up to growing security threats.

Continue reading

The changing role of the CTO [Q&A]

Between the rise of competition, the changing regulatory landscape, the evolution of AI and the rise of new threat actors, the role of the CTO can be a challenging one.

What characteristics are needed for the role and how can incumbents ensure that it remains relevant? We spoke to Ajay Keni, CTO at OneSpan, to find out.

Continue reading

Why enterprises must modernize their apps [Q&A]

Most organizations have some level of legacy apps. These can be hard to maintain and inhibit initiatives like data sharing. But the modernization process is challenging due to staffing, tools, training, and other issues.

We spoke to EvolveWare CEO Miten Marfatia to find out how enterprise IT can ease this complex process and ensure they get it right.

Continue reading

The top five capabilities SIEMs should have for accurate threat detection [Q&A]

Security Information and Event Management (SIEM) platforms are the centerpiece of many organization's security controls, but if these products aren't configured correctly they will produce too many false positives to be useful, and can even make overall threat detection worse.

Security analysts need to trust that their SIEM is detecting threats accurately. We spoke to Sanjay Raja from security analytics company Gurucul to discuss how SIEMs can be configured to offer accurate detection.

Continue reading

Why vulnerability management needs a refresh [Q&A]

Adversaries are exploiting new vulnerabilities much faster than organizations are remediating them. As a result, prioritizing the wrong vulnerabilities will squander security teams' most critical resource -- time.

So, how can organizations prioritize the right threats? We spoke with Anthony Bettini, founder and CEO of VulnCheck, to find out.

Continue reading

How organizations can safely adopt generative AI [Q&A]

Artificial intelligence

Generative AI tools like ChatGPT have been in the news a lot recently. While it offers many benefits it also brings risks which have led to some organizations banning its use by their staff.

However, the pace of development means that this is unlikely to be a viable approach in the long term. We talked to Randy Lariar, practice director of big data, AI and analytics at Optiv, to discover why he believes organizations need to embrace the new technology and shift their focus from preventing its use in the workplace to adopting it safely and securely.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.