Articles about Q&A

Adapting to a changing cybersecurity landscape [Q&A]

Laptop security

The past few years have seen some major changes in the IT world. Accelerated by the pandemic we've seen a significant shift to the cloud and hybrid working models.

But this brings with it additional risks. We spoke to Matt Spitz, head of engineering at Vanta, to discuss the security challenges posed and how enterprises can adapt to cope with them.

Continue reading

The return of data modeling -- this time it's strategic [Q&A]

financial data exchange

Over the past decade data modeling -- setting up data structures aligned to business requirements -- has tended to take something of a back seat as businesses have rushed to bring products to market.

But we're producing more data than ever and need ways to process it effectively. That's why Satish Jayanthi, CTO and co-founder at Coalesce, believes it's time for data modeling to make a comeback in enterprise strategy. We spoke to him to find out more.

Continue reading

Shifting left to improve data reliability [Q&A]

The concept of 'shifting left' is often used in the cybersecurity industry to refer to addressing security earlier in the development process.

But it's something that can be applied to data management too. Shifting left in this sense means performing data reliability checks sooner. The ability to execute data reliability tests earlier in the data pipelines helps keep bad data out of production systems.

Continue reading

How software-defined instrumentation is changing testing and measurement [Q&A]

Software testing

The testing and measurement industry like any other is looking towards digital transformation projects, but it’s a sector that in the past has been slow to adapt.

Software-defined instrumentation looks set to change that and drive transformation efforts forward. We spoke to Daniel Shaddock, the co-founder and CEO of Liquid Instruments and a professor of physics at the Australian National University, to find out more.

Continue reading

Data bias -- the hidden risk of AI and how to address it [Q&A]

machine learning AI

Artificial intelligence is generally only as good as the data that it's trained on. However, when data is collected and used in the training of machine learning models, the models inherit the bias of the people building them, producing unexpected and potentially harmful outcomes.

We spoke to Matthieu Jonglez, VP, technology at Progress, to discuss the company's recent research around this topic and what organizations can do to reduce bias.

Continue reading

Why SOCs need urgent modernization [Q&A]

Security Operations Centers (SOCs) aim to detect, investigate, remediate, and restore organizational systems to a fully functional, secure state, whether it's defending against insider threats, data exfiltration attempts, or malware attacks.

However, examining the daily issues faced by many SOCs reveals a concerning array of challenges that place increasing pressure on the work of SOCs and the dedicated professionals who manage them.

Continue reading

Why hybrid working needs better consolidation of IT [Q&A]

remote work

As the pandemic forced many businesses to adopt remote work, IT departments had to quickly adapt to new infrastructures and tools to support their employees from a distance.

But as hybrid working starts to become permanent businesses are reviewing their tech investments and seeking to provide a better remote user experience.

Continue reading

Are collaboration tools opening up a backdoor into enterprises? [Q&A]

The pandemic changed the way we work, with more people working from home and fewer in the office. That meant we became much more reliant on tools like Slack and Teams in order to keep in touch with colleagues.

Even though some people are now going back to the office, reliance on these collaboration tools remains high. The dark side of this trend is that cybercriminals have noticed and are increasingly using them as vectors for phishing attacks.

Continue reading

Dealing with the data authorization blindspot [Q&A]

Restricted Access sign

User authorization for access to data is complicated. Knowing who has access to what information is often difficult because of complex role hierarchies, different authorization models used for different technologies, and the variety of data that may be accessible across technologies and clouds.

Ben Herzberg, chief scientist at data security platform Satori, believes there's often a blindspot around authorization, but that the issue doesn't have to be as complex as it can seem. We talked to him to learn more.

Continue reading

Disrupting the phishing killchain with new defenses [Q&A]

Recent reports have shown that email is still the channel where enterprises are most vulnerable to attacks, in particular phishing.

But adding new browser-based layers of security protection can disrupt such killchains, for example by preventing phishing victims from accessing or engaging with spoofed sites. We spoke to Red Access co-founder and CTO Tal Dery to find out more.

Continue reading

Real-time web data -- a new source of competitive intelligence [Q&A]

Gathering real-time public web data for business intelligence is a new competitive asset for some companies, but little information is available about the use cases for such data.

We spoke to Aleksandras Šulženko, product owner at Oxylabs.io, to learn more about how web data can be a valuable resource for enterprises.

Continue reading

Hacking and why it can be good for cybersecurity [Q&A]

Hacking tends to have something of a bad name, but there are many hackers who do good work, identifying flaws before they can be exploited in cyberattacks.

However, many of these people operate in the shadows for fear of being prosecuted for violating legislation. We talked to Laurie Mercer, director of sales engineering at security platform HackerOne, to discuss whether ethical hackers need to be more open about their activities in order to bring about change and how ethical hacking is making organizations safer.

Continue reading

Preparing the workforce for AI [Q&A]

Artificial intelligence isn't all that new, but recently the availability of tools like ChatGPT has catapulted it into the public consciousness. When it comes to introducing AI in the workplace though it's inevitable that some people will perceive it as a threat.

We talked to Khadim Batti, Whatfix CEO and co-founder, to discover how enterprise leaders can prepare their workforces for AI and overcome the challenges that it presents.

Continue reading

Why CSOs are prioritizing PKI infrastructure as they adapt to post-quantum cryptography [Q&A]

A growing number of machine identities leaves organizations with the task of managing increasingly complex PKI infrastructure.

We spoke to Chris Hickman, CSO of Keyfactor, about how organizations can go about reducing PKI complexity as well as other trends to keep in mind as they adapt to an era of post-quantum cryptography.

Continue reading

Physical meets digital -- the changing world of augmented reality [Q&A]

The physical and digital worlds continue to intertwine in new and exciting ways, and more precise mapping of the real world opens up unique opportunities for brands to drive more traffic and engagement to physical locations.

We spoke to Rypplzz CEO Josh Pendrick about why he believes augmented reality is a sector that's ripe for disruption.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.