Why hybrid working needs better consolidation of IT [Q&A]


As the pandemic forced many businesses to adopt remote work, IT departments had to quickly adapt to new infrastructures and tools to support their employees from a distance.
But as hybrid working starts to become permanent businesses are reviewing their tech investments and seeking to provide a better remote user experience.
Are collaboration tools opening up a backdoor into enterprises? [Q&A]


The pandemic changed the way we work, with more people working from home and fewer in the office. That meant we became much more reliant on tools like Slack and Teams in order to keep in touch with colleagues.
Even though some people are now going back to the office, reliance on these collaboration tools remains high. The dark side of this trend is that cybercriminals have noticed and are increasingly using them as vectors for phishing attacks.
Dealing with the data authorization blindspot [Q&A]


User authorization for access to data is complicated. Knowing who has access to what information is often difficult because of complex role hierarchies, different authorization models used for different technologies, and the variety of data that may be accessible across technologies and clouds.
Ben Herzberg, chief scientist at data security platform Satori, believes there's often a blindspot around authorization, but that the issue doesn't have to be as complex as it can seem. We talked to him to learn more.
Disrupting the phishing killchain with new defenses [Q&A]


Recent reports have shown that email is still the channel where enterprises are most vulnerable to attacks, in particular phishing.
But adding new browser-based layers of security protection can disrupt such killchains, for example by preventing phishing victims from accessing or engaging with spoofed sites. We spoke to Red Access co-founder and CTO Tal Dery to find out more.
Real-time web data -- a new source of competitive intelligence [Q&A]


Gathering real-time public web data for business intelligence is a new competitive asset for some companies, but little information is available about the use cases for such data.
We spoke to Aleksandras Šulženko, product owner at Oxylabs.io, to learn more about how web data can be a valuable resource for enterprises.
Hacking and why it can be good for cybersecurity [Q&A]


Hacking tends to have something of a bad name, but there are many hackers who do good work, identifying flaws before they can be exploited in cyberattacks.
However, many of these people operate in the shadows for fear of being prosecuted for violating legislation. We talked to Laurie Mercer, director of sales engineering at security platform HackerOne, to discuss whether ethical hackers need to be more open about their activities in order to bring about change and how ethical hacking is making organizations safer.
Preparing the workforce for AI [Q&A]


Artificial intelligence isn't all that new, but recently the availability of tools like ChatGPT has catapulted it into the public consciousness. When it comes to introducing AI in the workplace though it's inevitable that some people will perceive it as a threat.
We talked to Khadim Batti, Whatfix CEO and co-founder, to discover how enterprise leaders can prepare their workforces for AI and overcome the challenges that it presents.
Why CSOs are prioritizing PKI infrastructure as they adapt to post-quantum cryptography [Q&A]


A growing number of machine identities leaves organizations with the task of managing increasingly complex PKI infrastructure.
We spoke to Chris Hickman, CSO of Keyfactor, about how organizations can go about reducing PKI complexity as well as other trends to keep in mind as they adapt to an era of post-quantum cryptography.
Physical meets digital -- the changing world of augmented reality [Q&A]


The physical and digital worlds continue to intertwine in new and exciting ways, and more precise mapping of the real world opens up unique opportunities for brands to drive more traffic and engagement to physical locations.
We spoke to Rypplzz CEO Josh Pendrick about why he believes augmented reality is a sector that's ripe for disruption.
When is an IT risk a cyber risk? And why the difference matters [Q&A]


There tends to be some confusion about where cyber risk ends and where IT risk starts and the terms are often used interchangeably.
We spoke to Gary Lynam, head of ERM advisory at risk management specialist Protecht, to find out more about understanding and managing the different types of risk that enterprises face.
Uncovering the security gaps that expose hybrid identity systems to attackers [Q&A]


Hybrid computing environments, which combine on-premises and cloud-based technologies, have become increasingly common in recent years. This shift has created new security challenges for IT leaders, particularly when it comes to managing the security of identity environments.
We spoke with Ran Harel, associate vice president of security products at Semperis, to find out more about the changing risk landscape and how it can be addressed.
How object storage can contribute to cybersecurity analytics [Q&A]


Data volumes are growing exponentially year after year, this means huge amounts of log data that security teams are struggling to collect, analyze and act on in a timely manner.
As a result, security teams are inundated with data that is fragmented across locations and platforms. We spoke to CTO of MinIO Ugur Tigli to discuss how modern object storage can be used to build automated cybersecurity analytics pipelines to break down these barriers and enable security teams to quickly take action on the information stored in log files.
How do you know what's real and what's AI? [Q&A]


The world is increasingly buzzing with stories about AI generated content. Today when you contact a business you might equally well be talking to a bot as a human, but is it possible to spot AI generated content and should we be worried about it?
We spoke to Gaurav Kachhawa, chief product officer of conversational messaging platform Gupshup, to find out how to distinguish AI-generated content, as well as the ethics that surround its use.
The top drivers of wasted IT spend in a hybrid-first environment [Q&A]


From rising collaboration expenses to a need for more devices per employee, hybrid work models have driven a need for new investments in workplace technology.
However, a significant portion of IT spend is wasted in a hybrid-first environment, often due to a reliance on manual processes that don't provide much-needed visibility into organizational endpoints.
The importance of blockchain security in an interconnected world [Q&A]


Blockchain is best known for its application in securing cryptocurrency. But in recent years it's expanded to drive emerging business in other sectors such as healthcare, real estate, smart contracts, and more.
Because blockchain ensures a tamper-proof ledger of the distributed transactions, it's sometimes used for high-risk transactions and exchanges. But this presents high stakes opportunities for adversaries to steal money and sensitive information.
Recent Headlines
Most Commented Stories
Betanews Is Growing Alongside You
Only a fool still uses Windows 7
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.