Articles about Q&A

Ensuring compliance through network automation [Q&A]

Compliance gauge

Cyber threats are on the rise across every industry and business size, highlighting the importance of maintaining network compliance for organizations and especially for IT and security teams.

But that's easier said than done, with many industry-specific compliance regulations like the Health Insurance Portability and Accountability Act (HIPAA) or the Payment Card Industry Data Security Standard (PCI) each with their own set of standards and processes.

Continue reading

Data privacy and the changes enterprises need to be ready for [Q&A]

privacy key

It has been estimated that there are some 43 zetabytes of data stored by enterprises today that are inaccessible and not commercialized due to privacy concerns, operational complexity and regulations.

With the California Consumer Privacy Act (CCPA) becoming fully operational on January 1 2023 and other legislation in place or coming around the world, the need for businesses to find new data accessibility methods that are compliance-friendly is very real.

Continue reading

All you need to know about SASE and SSE but never dared ask [Q&A]

The cybersecurity industry loves a good acronym and in recent times SASE and SSE have been among the ones to grab popular attention.

But in many cases a number of disparate technologies have been patched together to fulfill the promise of a unified solution for securing and accessing the service edge. Often this has occurred through company acquisitions.

Continue reading

The challenges of modernizing enterprise API infrastructure [Q&A]

api

APIs allow products and services to communicate with each other and have become essential to digital transformation projects as they make it easy to open up application data and functionality to third-party developers and business partners, or to departments within the enterprise.

Where legacy systems are involved though it's often necessary to modernize the API infrastructure to ensure things work smoothly and this can lead to serious challenges, especially where security is concerned.

Continue reading

How to choose the safest data center [Q&A]

Data center

Data centers around the world are currently home to an estimated 1,327 exabytes of data. This information has a potentially huge value so it needs protecting.

But as more businesses choose to trust their information to external data centers how can they be sure that it's going to be properly secured? We spoke to Oliver Pinson-Roxburgh, CEO of Defense.com, to find out how organizations can choose the most secure data center possible?

Continue reading

Why services from big telcos aren't keeping up with business needs [Q&A]

The needs of enterprises have changed radically in recent years. The COVID-19 pandemic and the move towards remote and hybrid workplaces, as well as a move towards more online commerce have all brought more dependence on the internet and communications.

Matt Carter, CEO of Aryaka, believes that the giants of the telecommunications industry, 'Big Telco', have failed to keep up with these trends. We spoke to him to find out why and what needs to change.

Continue reading

How gamification can help solve the skills shortage [Q&A]

Almost all areas of the IT industry are suffering from a shortage of skilled staff. In order to prevent the skilled people you do have being poached by other companies it's important to keep them happy.

One of the methods of doing that is to improve their level of engagement. Martin Browne, customer experience chief technologist of communications provider DigitalWell, believes that the way to achieve better engagement is by using gamification, we spoke to him to find out more.

Continue reading

How AI can help access collective memory within the enterprise [Q&A]

Many industries rely on the accumulated knowledge and experience of both middle and upper management. However, this can lead to jobs being done in a certain way simply because, 'they always have been', which in turn can lead to repeated mistakes.

Relying on this collective memory can also make it hard to access information, particularly in the new era of hybrid work.

Continue reading

How fake data can help to combat breaches [Q&A]

September this year marked five years since the notorious Equifax data breach which exposed the social security numbers, birthdates, credit card details, and more of millions of customers.

But how much has the industry learned from this breach? And what measures can be used to help avoid similar issues in the future? We spoke to Ian Coe, co-founder at Tonic.ai to find out why fake data might be the answer.

Continue reading

Is this the right time to look for a job in crypto? [Q&A]

Cryptocurrency coins

The cryptocurrency markets have been going through a hard time of late with a bear market and big swings in value. So is now the time to apply for a crypto job?

Crypto technology isn't going away, and many more companies are getting involved. We spoke to Bijan Shahrokhi, fintech expert and creator of Product Management Exercises, to find out whether this is a good time to apply for a job in crypto and how to improve your chances of getting one.

Continue reading

Why the time is right for passwordless authentication [Q&A]

web authentication

Although the death of passwords has been predicted for a long time, the move to other forms of authentication has until recently been glacially slow.

The shift to remote working driven by the pandemic has increased interest in securing wider networks and that has put passwordless authentication into the spotlight. We spoke to Tom Bridge, principal product manager at JumpCloud, to find out more about the technology and the benefits it offers.

Continue reading

What popular culture gets wrong about hacking [Q&A]

hacker

It's safe to say that Hollywood and pop culture have not always been kind to the tech and cybersecurity industry.

Throughout the years, movies and TV shows have established a stereotype of how IT and security experts should look, with one of the biggest stereotypes being the representation of a hacker.

Continue reading

Defending against critical infrastructure attacks [Q&A]

industrial skyline

Critical infrastructure is a prime target for cybercriminals and nation state actors. It often operates on legacy operational technologies (OT) which have vulnerabilities that can't be fixed easily or directly. 

We spoke to John Moran, technical director, business development at Tufin, to discuss how organizations can protect themselves. John is a former incident response consultant and is a cybercrime forensics expert.

Continue reading

Application security best practices and trends [Q&A]

Businesses today face a wider and more dangerous array of cybersecurity threats than ever before. In the UK alone there were more than 400,000 reports of fraud and cybercrime in 2021. Those crimes come with significant costs too. In addition to the reputational damage that comes with cybersecurity incidents, data breaches cost UK companies an average of US$4.35 million.

That makes it critical that organizations have the best possible cyber defences in place, not just for the threats they face today but also for those of tomorrow. This is especially true for business-critical applications like ERP systems that need to be run continuously in order for the organization to keep operating smoothly and servicing its customers.

Continue reading

Why SBOMs are key to securing the software supply chain [Q&A]

supply chain

Attacks on the software supply chain have become more common in recent years. Part of the key to tackling them lies in understanding what components are in your software and where they originate.

This is why the software bill of materials (SBOM) has become a vital tool for organizations seeking to secure their software. We spoke to Alex Rybak, senior director, product management at Revenera to learn more about SBOMs and what advantages they offer.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.