Cloud data protection

How organizations can get a handle on cloud security [Q&A]

As cloud-based enterprises continue to grow, the security threats in the cloud grow with them. Organizations operate in complex, multilayered environments that leave security teams scrambling to protect all of their organization's assets and resources. In fact, they may not even be aware of all of them.

What are the biggest risks they face today? And how can organizations mitigate their vulnerabilities?

By Ian Barker -
Compliance rule law and regulation graphic interface for business quality policy

How AI can help app developers keep up with changing regulations [Q&A]

A changing regulatory landscape can prove difficult for app developers as they need to make sure they remain compliant and keep up with evolving rule sets.

We spoke to Pedro Rodriguez, head of engineering at AI-powered compliance intelligence platform Checks, to find out how AI can help mobile app developers to handle data responsibly and keep up with ever-changing global regulations,

By Ian Barker -
Technology center with fiber optic equipment

Network security is ripe for automation -- except when it isn't [Q&A]

According to one analyst estimate, the market for network automation tools will grow nearly 23 percent annually from 2022-2030.

While many IT professionals are familiar with automation of business processes, they are likely less familiar with its applications in network operations (NetOps) and security. As automation technology is maturing, organizations are using network automation solutions to transform their core workflows, including troubleshooting, change management and network security, for more efficient and effective network operations.

By Ian Barker -
Public wi-fi

The risks of public Wi-Fi and how to stay safe [Q&A]

The demands of daily lives increasingly mean that we want to be connected wherever we are. Add in the shift to hybrid working and we’re likely to want to be in touch with the office all the time too.

That makes the lure of free public Wi-Fi, whether it's in a coffee shop, a hotel or an airport, hard to resist, especially if you have a limited data allowance on your mobile contract. But of course using public networks always comes with a side order of added risk.

By Ian Barker -
cloud security

Why you need a multi-layered strategy to secure the cloud [Q&A]

Recent cyber attacks have seen not just the usual monetary motives but also the rise of espionage attempts with attacks on government officials.

So how can organizations, both public and private sector, protect their most valuable assets? We spoke to Glenn Luft, VP of engineering at Archive360, to find out.

By Ian Barker -
Healthcare cybersecurity

The challenges of securing the healthcare sector [Q&A]

The healthcare sector is particularly attractive to cybercriminals due to the amount of personal data held and the critical nature of many systems.

We spoke to Shankar Somasundaram, CEO of IoT risk management platform Asimily, to discuss healthcare systems and the challenges involved in securing them.

By Ian Barker -
castle_portcullis

From castles to cities -- a modern approach to authorization [Q&A]

Corporate information security has traditionally used the 'castle' approach, using a strong boundary to keep everything secure.

But as we've moved to hybrid working and more sharing of information the castle is too restrictive and we've moved towards a 'city' model, allowing open routes to trade with assets widely distributed.

By Ian Barker -
building management automation

Why building management system cybersecurity is critical [Q&A]

Building management systems (BMS) are responsible for controlling and monitoring various building services such as HVAC, energy, elevators, escalators, surveillance and access control.

They're crucial for service delivery across industries, including critical infrastructure such as energy, utilities, and healthcare. But they're also a significant of an organization's cyber risk due to their integration with IT networks and the internet.

By Ian Barker -
Digital data

Why structured data offers LLMs tremendous benefits -- and a major challenge [Q&A]

ChatGPT and other LLMs are designed to train and learn from unstructured data -- namely, text. This has enabled them to support a variety of powerful use cases.

However, these models struggle to analyze structured data, such as numerical and statistical information organized in databases, limiting their potential.

By Ian Barker -
Secret

Why secrets management is key to securing your systems [Q&A]

The shift towards cloud and hybrid models of IT along with containerization has placed greater emphasis on the need for secure authentication, whether it’s via passwords, certificates or keys.

Managing these 'secrets' effectively is therefore key to keeping systems secure. We spoke to Oded Hareven, co-founder and CEO at Akeyless Security to find out more.

By Ian Barker -
cloud confusion

Addressing the risks of using bulk remediation with Google Drive [Q&A]

Bulk remediation in Google Shared Drives can be useful in removing unneeded permissions, revoking expired access and ensuring that data remains secure.

But it can also present significant challenges due to the complex nature of managing permissions across a large number of files and users. Administrators face the difficulty of ensuring accurate and appropriate access levels for each file and user.

By Ian Barker -
CI/CD DevOps

CI and CD -- what they are and why they're not the same [Q&A]

You'll often hear CI (continuous integration) and CD (continuous deployment) mentioned in the same breath, often as CI/CD, and indeed both are part of improving the quality, speed and efficiency of software development.

However, Stephen Atwell, principal product manager at Armory, argues that they shouldn't be considered as related functions. We spoke to him to find out why.

By Ian Barker -
data protection

The blurring lines between data protection and security [Q&A]

The threat landscape has evolved a lot over the past few years as cybercriminals become more and more sophisticated. This has forced change within the industry and blurred the lines between the previous separate data protection and security strategies.

We spoke to Jason Gerrard, senior director of international systems engineering at Commvault, to find out more about why this is happening and what it means for the future of the data protection and cybersecurity industries.

By Ian Barker -
Cyber attack

How contextual analysis can offer insight into the human element behind cyber threats [Q&A]

Cyber threats can come in many forms, over email, messaging platforms or social media. But what they all have in common is that they seek to exploit human weaknesses.

We spoke to Chris Lehman, CEO of SafeGuard Cyber, to discover how contextual analysis of business conversations can help determine if a conversation is benign or if something suspicious is taking place, allowing action to be taken.

By Ian Barker -
businessman hand phone and world map

The rise of mobile app overlay attacks and how to defend against them [Q&A]

A major new threat has made its presence felt in the last few months. Cybercriminals have expanded the use of screen spoofing or overlay attacks from web applications to trusted mobile apps.

What’s more, the availability of as-a-service technology has lowered the threshold for attacks. We spoke to Dr. Klaus Schenk, SVP security and threat research at Verimatrix, to learn more about how these attacks work and what can be done to guard against them.

By Ian Barker -
Load More Articles