Taking a battlefield approach to cybersecurity [Q&A]


You'll often hear cybersecurity discussed in military terms, as a war, or a battle, or a conflict. So should enterprises be taking a defensive approach that draws on military thinking?
Tom Gorup is VP of security operations at Fortra's Alert Logic, a managed detection and response specialist. He's also a veteran of six years in the US Army with tours of Iraq and Afghanistan. We spoke to him to discover how lessons learned on the battlefield can be applied to cybersecurity.
Protecting backups from ransomware [Q&A]


Cybercriminals know that backups are the last line of defense against ransomware, so it’s essential that they are properly protected.
In an ideal world they would be air-gapped but in the current era of hyperconnectivity that can prove somewhat impractical. We talked to Bret Piatt, CEO of CyberFortress, to discuss the need to protect backups and the strategies for doing so.
Why your security strategy needs to be pre-emptive [Q&A]


As cyberattacks become more sophisticated, so traditional security techniques may no longer be up to the task of protecting systems.
What's needed is an approach that can spot the routes an attacker may use and help close them down. We spoke to Todd Carroll, CISO at CybelAngel and with over 20 years previous experience in the FBI's cyber, counter intelligence, and counter terrorism branches, to discuss the need for a pre-emptive attitude to cybersecurity and how such an approach can work.
Why cross-platform capability is vital to the future of development [Q&A]


Increasingly consumers and businesses alike are relying on portable devices, and that means it's important that apps are available across several different systems.
We spoke to Jerome Laban, CTO of Uno Platform -- which allows Microsoft developers, using traditional C# and XAML, to take their apps to iOS, Android, Mac, Linux, and the web -- to find out more about cross-platform development and how it can future-proof applications.
Why SaaS needs a holistic approach to security [Q&A]


As organizations move more of their systems to the cloud they face a new range of threats. This combined with a shortage of cybersecurity skills makes securing SaaS systems a challenge.
Galit Lubetzky Sharon, co-founder and CTO of Wing Security, believes that a new more holistic approach, involving employees across the organization, is needed. We spoke to her to learn more.
Fueling the Apple BYOD revolution [Q&A]


It's no secret that BYOD provides incredible benefits on paper -- from increased productivity to more flexibility and streamlined output. But unfortunately, many initiatives fail to take off due to security and privacy concerns.
Mosyle CEO Alcyr Araujo believes this doesn't always have to be the case, and that Apple devices are primed to offer the best balance for BYOD. We spoke to him to find out more.
Ensuring compliance through network automation [Q&A]


Cyber threats are on the rise across every industry and business size, highlighting the importance of maintaining network compliance for organizations and especially for IT and security teams.
But that's easier said than done, with many industry-specific compliance regulations like the Health Insurance Portability and Accountability Act (HIPAA) or the Payment Card Industry Data Security Standard (PCI) each with their own set of standards and processes.
Data privacy and the changes enterprises need to be ready for [Q&A]


It has been estimated that there are some 43 zetabytes of data stored by enterprises today that are inaccessible and not commercialized due to privacy concerns, operational complexity and regulations.
With the California Consumer Privacy Act (CCPA) becoming fully operational on January 1 2023 and other legislation in place or coming around the world, the need for businesses to find new data accessibility methods that are compliance-friendly is very real.
All you need to know about SASE and SSE but never dared ask [Q&A]


The cybersecurity industry loves a good acronym and in recent times SASE and SSE have been among the ones to grab popular attention.
But in many cases a number of disparate technologies have been patched together to fulfill the promise of a unified solution for securing and accessing the service edge. Often this has occurred through company acquisitions.
The challenges of modernizing enterprise API infrastructure [Q&A]


APIs allow products and services to communicate with each other and have become essential to digital transformation projects as they make it easy to open up application data and functionality to third-party developers and business partners, or to departments within the enterprise.
Where legacy systems are involved though it's often necessary to modernize the API infrastructure to ensure things work smoothly and this can lead to serious challenges, especially where security is concerned.
How to choose the safest data center [Q&A]


Data centers around the world are currently home to an estimated 1,327 exabytes of data. This information has a potentially huge value so it needs protecting.
But as more businesses choose to trust their information to external data centers how can they be sure that it's going to be properly secured? We spoke to Oliver Pinson-Roxburgh, CEO of Defense.com, to find out how organizations can choose the most secure data center possible?
Why services from big telcos aren't keeping up with business needs [Q&A]


The needs of enterprises have changed radically in recent years. The COVID-19 pandemic and the move towards remote and hybrid workplaces, as well as a move towards more online commerce have all brought more dependence on the internet and communications.
Matt Carter, CEO of Aryaka, believes that the giants of the telecommunications industry, 'Big Telco', have failed to keep up with these trends. We spoke to him to find out why and what needs to change.
How gamification can help solve the skills shortage [Q&A]


Almost all areas of the IT industry are suffering from a shortage of skilled staff. In order to prevent the skilled people you do have being poached by other companies it's important to keep them happy.
One of the methods of doing that is to improve their level of engagement. Martin Browne, customer experience chief technologist of communications provider DigitalWell, believes that the way to achieve better engagement is by using gamification, we spoke to him to find out more.
How AI can help access collective memory within the enterprise [Q&A]


Many industries rely on the accumulated knowledge and experience of both middle and upper management. However, this can lead to jobs being done in a certain way simply because, 'they always have been', which in turn can lead to repeated mistakes.
Relying on this collective memory can also make it hard to access information, particularly in the new era of hybrid work.
How fake data can help to combat breaches [Q&A]


September this year marked five years since the notorious Equifax data breach which exposed the social security numbers, birthdates, credit card details, and more of millions of customers.
But how much has the industry learned from this breach? And what measures can be used to help avoid similar issues in the future? We spoke to Ian Coe, co-founder at Tonic.ai to find out why fake data might be the answer.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.