Artificial intelligence banking

Why bad bots and open banking are creating opportunities for cybercriminals [Q&A]

We all know that bad bots are, well… Bad. But open banking is supposed to be good, giving consumers more control over their finances. Combine open banking and bad bots though and you have opened up a world of new threats to banks, customers, and their data.

We spoke to Alan Ryan, AVP for UK and Ireland at Imperva, about how open banking has created new opportunities for cybercriminals, and why the traditional siloed approach to security needs re-appraising.

By Ian Barker -
Cloud

The battle for control of cloud environments [Q&A]

Lack of control has long been a pain point for developers in cloud computing, especially with the market dominated -- and controlled -- by a few large providers.

What's likely to happen as developers' desire for control meets the hyperscalers' desire to keep companies locked into their platforms? We spoke to Billy Thompson, solutions engineering manager at Akamai, to find out.

By Ian Barker -
Threats from internet, gadget addiction

The rise in mobile device security threats and the growing attack surface [Q&A]

Both government agencies and corporations are being tasked with developing strategies for protecting mobile devices from an increasing wave of attacks. CISOs and business leaders are asking themselves not only how they can use mobile devices to make employees more productive, but also how to realize the full potential of a mobile-powered business.

As leaders execute their mobile-powered businesses, they will also need to parallel these initiatives with mobile-first security strategies to address the fast-growing attack surfaces that bad actors are increasingly jumping on. We spoke to Shridhar Mittal, CEO of Zimperium to discover more.

By Ian Barker -
man_banned_label

Is banning the right solution to dealing with problem apps? [Q&A]

Lots of apps are potentially transmitting and saving user data without express permission and this has led some administrations to consider bans.

In May, Montana passed the first bill to ban TikTok statewide due to data concerns, and India has banned 60 apps, including TikTok, claiming they were transmitting user data back to China.

By Ian Barker -
Password on a sticky note

Does the password still have a future? [Q&A]

The death of the password has been predicted for a long time, yet despite increased adoption of biometrics, passkeys and other newer technologies, passwords still underpin much of our day-to-day security.

We spoke to Darren James, senior product manager at Specops Software, to discuss passwords, whether they still have a future and where authentication is heading.

By Ian Barker -
Incident Response - Inscription on Blue Keyboard Key.

Why it's critical to have an incident response plan [Q&A]

Recent research carried out by IBM found that organizations with regularly tested incident response plans had a $2.66 million lower data breach cost than organizations without them.

We spoke to Adam Scamihorn, product director at InterVision, to find out why every enterprise needs to have a strong incident response plan in order to face up to growing security threats.

By Ian Barker -
Computer evolution

The changing role of the CTO [Q&A]

Between the rise of competition, the changing regulatory landscape, the evolution of AI and the rise of new threat actors, the role of the CTO can be a challenging one.

What characteristics are needed for the role and how can incumbents ensure that it remains relevant? We spoke to Ajay Keni, CTO at OneSpan, to find out.

By Ian Barker -
code software developer development

Why enterprises must modernize their apps [Q&A]

Most organizations have some level of legacy apps. These can be hard to maintain and inhibit initiatives like data sharing. But the modernization process is challenging due to staffing, tools, training, and other issues.

We spoke to EvolveWare CEO Miten Marfatia to find out how enterprise IT can ease this complex process and ensure they get it right.

By Ian Barker -
Threat concept

The top five capabilities SIEMs should have for accurate threat detection [Q&A]

Security Information and Event Management (SIEM) platforms are the centerpiece of many organization's security controls, but if these products aren't configured correctly they will produce too many false positives to be useful, and can even make overall threat detection worse.

Security analysts need to trust that their SIEM is detecting threats accurately. We spoke to Sanjay Raja from security analytics company Gurucul to discuss how SIEMs can be configured to offer accurate detection.

By Ian Barker -
server vulnerability unlock

Why vulnerability management needs a refresh [Q&A]

Adversaries are exploiting new vulnerabilities much faster than organizations are remediating them. As a result, prioritizing the wrong vulnerabilities will squander security teams' most critical resource -- time.

So, how can organizations prioritize the right threats? We spoke with Anthony Bettini, founder and CEO of VulnCheck, to find out.

By Ian Barker -
Artificial intelligence

How organizations can safely adopt generative AI [Q&A]

Generative AI tools like ChatGPT have been in the news a lot recently. While it offers many benefits it also brings risks which have led to some organizations banning its use by their staff.

However, the pace of development means that this is unlikely to be a viable approach in the long term. We talked to Randy Lariar, practice director of big data, AI and analytics at Optiv, to discover why he believes organizations need to embrace the new technology and shift their focus from preventing its use in the workplace to adopting it safely and securely.

By Ian Barker -
Low code

Why serverless platforms will unlock a new era of low-code development [Q&A]

As developers look for ways to improve productivity they're moving away from 'no-code' offerings and have their sights set on serverless platforms to help bolster their 'low-code' solutions.

Serverless platforms take tasks like managing application resilience, performance, security and compliance away from developers, allowing them to focus on functionality and innovation. We spoke to Briana Frank, VP of product at IBM Cloud to find out more about how serverless will unlock the next era of low-code.

By Ian Barker -
GDPR graphic

Why UK-based companies are at a crossroads with GDPR [Q&A]

Data privacy regulation, GDPR, has been in force for five years but it will soon be superseded by UK GDPR. The Data Protection and Digital Information Bill, now wending its way through parliament, will see organisations move to a UK equivalent following the country's withdrawal from the EU. But what will the change mean in practice?

We spoke to Jon Fielding, managing director of EMEA at Apricorn, to find out how UK GDPR will affect businesses and how they handle and protect data.

By Ian Barker -
Document Automation under the piece of  torn paper

How document automation can take the pressure off IT teams [Q&A]

The shift to remote work, the Great Resignation and high staff turnover have meant that many IT teams have seen a big increase in their workloads over the last few years.

Automation is often seen as a way of addressing the problem, but can it really help to reduce workloads and get IT departments back on track? We spoke to Shawn Herring, CMO of document workflow specialist airSlate, to find out.

By Ian Barker -
Cybersecurity-blocks

A holistic approach to closing the container security gap [Q&A]

Among cloud developers, Kubernetes is now a widely used platform. It's not immune to security incidents, however, and these can lead to loss of revenue or customers.

So, what's the best way to secure Kubernetes systems? Alex Jones, engineering director Kubernetes at Canonical, suggests a need to look beyond containers with a holistic approach to security that spans all layers of the system. We talked to him to discover more.

By Ian Barker -
Load More Articles