Articles about Q&A

How AI-enhanced cyberattacks are redefining the modern threat landscape [Q&A]

Despite still being in its infancy, it would be hard to overstate the impact that AI has already had on the cybersecurity landscape.

Not only has AI made it infinitely easier and faster to develop a wide range of traditional attacks -- such as phishing, business email compromise and malware -- it has also opened the door to novel strategies and threats. Worse yet, they allow threat actors to develop significantly more targeted and sophisticated attacks, regardless of their knowledge level or skill.

Continue reading

The impact of AI on professional services [Q&A]

Traditional business models are changing as the adoption of artificial intelligence increases. In the professional services sector there's still heavy reliance on spreadsheets, but a recent survey reveals optimism about AI's impact.

We spoke to Andy Campbell, director of solutions marketing at Certinia, to learn about the impact AI is having on professional services and his outlook for the market.

Continue reading

What last year's biggest data breaches have taught us about authentication [Q&A]

Multifactor authentication

According to the Identity Theft Resource Center (ITRC) there were 1.1 billion breaches in the first half of 2024 -- a 490 percent increase over the first half of the year before.

In addition, an enormous and unprecedented rate of credential stuffing and bot attacks have been spearheaded by ChatGPT's debut. All of this means having intelligent and accurate fraud prevention techniques have never been so critical.

Continue reading

What NIS2 implementation means for enterprises [Q&A]

As cyberattacks across sectors continue to rise, businesses face pressure to enhance their security postures amid budget restraints and operational challenges.

In the EU, the new Network and Information Security Directive (NIS2) is making it mandatory for companies in Europe -- and those doing business with Europe -- to not only invest in cybersecurity, but to prioritize it regardless of budgets and team structures.

Continue reading

What businesses miss when protecting their data [Q&A]

No business is immune from the threat of cyberattack, but when it comes to protecting their most critical and sensitive data many feel they are inadvertently helping attackers through the leaking information.

We spoke to Paul Laudanski, director of security research at Onapsis, to learn about the most common errors and how to guard against them,

Continue reading

Navigating Linux security and management in a multi-OS landscape [Q&A]

While Windows remains the most targeted operating system, Linux, once regarded as 'secure by default', has now emerged as the second-most infected OS, according to the 2024 Elastic Global Threat Report.

Linux's expanding use beyond servers has broadened its attack surface. Plus, its open-source nature, while great for developers, can also lead to mistakes and security holes. We spoke to Apu Pavithran, founder and CEO of Hexnode, to find out more about why Linux is being targeted and how it can be defended.

Continue reading

Deepfakes and how to deal with them [Q&A]

With deepfakes getting more sophisticated and harder to detect both organizations and individuals are at risk of falling victim to fraud and phishing attempts.

We spoke to SURF Security CTO, Ziv Yankovitz, to learn more about the increasing threat of deepfakes and best practices that can be used to for combat attacks.

Continue reading

Why we need to focus on mobile device security [Q&A]

When getting a new smartphone most people focus on features and pricing, while security tends to be overlooked. But as we access the internet more using mobile devices, protecting users' personal information, transactions, and digital identities is vital.

We talked to Tom Tovar, CEO of Appdome, to discuss why mobile security should be at the forefront of consumer and media conversations and why it's currently being neglected.

Continue reading

Ransomware readiness -- how boards can lead the charge against cyber threats [Q&A]

Ransomware attacks are increasingly targeting organizations across industries, with the potential to cause devastating financial, operational, and reputational damage.

We spoke to James Eason, practice lead for cyber risk and compliance at Integrity360, to get his insights into how executive boards can effectively prepare for such incidents.

Continue reading

How the role of CISO is evolving [Q&A]

The overall threat landscape facing organizations is expanding, yet many of the threats such as phishing remain the old favorites. What's more, AI is making them more effective by eliminating many of the old tell-tale signs.

With the evolving challenges and risks facing them, how can CISOs effectively network internally and externally to gather support of the broader team and build an appropriate security posture? We spoke to Robin Bell, CISO at Egress, to find out.

Continue reading

How GenAI is set to change procurement [Q&A]

In recent years generative AI has made its way into many areas of business, helping to transform and streamline processes. However, its potential in the procurement space remains relatively unexplored.

We talked to Kevin Frechette, CEO of Fairmarkit, to find out how enterprises can exploit GenAI to gain agility, efficiency, and smarter decision-making in their sourcing decisions.

Continue reading

Is AI the answer to compliance challenges? [Q&A]

Increasing amounts of regulation are creating an issue for businesses as they seek to ensure compliance whilst still delivering on their core activities. This is leading many to boost the size of their security teams.

We spoke to Jay Trinckes, CISO of Thoropass, who believes that using AI, with its ability to analyze vast amounts of data quickly and accurately, will be key to bridging this gap without the need for massively expanded staffing.

Continue reading

Regulation and its role in protecting critical infrastructure [Q&A]

Protecting critical national infrastructure (CNI) against attack is a huge undertaking for governments and for those organizations that deliver CNI services.

New regulation in Europe -- the NIS2 Directive -- includes an increased focus on resilience for CNI, covering traditional critical services like banking, utilities, transport and public safety as well as new provisions for digital service providers. In 2025, the Digital Operational Resilience Act (DORA) will enforce more stringent resilience and security requirements on the financial sector. And in the UK, the forthcoming Cyber Security and Resilience Bill will demand more investment in security too.

Continue reading

The risks and rewards of shadow AI [Q&A]

As with other forms of 'off the books' shadow tech, used by employees without company approval, shadow AI is a double-edged sword.

Cyberhaven Labs recently reported a sharp 485 percent increase in corporate data flowing to AI systems, with much of it going to risky shadow AI apps.

Continue reading

How businesses are adapting to the challenges of AI [Q&A]

A recent survey found that only 37 percent of businesses are prepared for AI. This means they risk being left behind as competitors embrace the technology.

We spoke to Richard Tworek, CTO at Riverbed about how organizations can embrace AI and how they can succeed in today's rapidly evolving landscape.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.