Articles about Q&A

The changing role of the CISO [Q&A]

CISO

The IT infrastructure of a modern enterprise is made up of a complex architecture of dynamic networks, cloud deployments, software applications, and endpoint devices.

Each of these has its own set of security controls, which form a critical part of the technology ecosystem, but managing these systems can hinder efficient threat detection and response, which in turn compromises visibility, allowing vulnerabilities and gaps to flourish.

Continue reading

Why run your database in Kubernetes? [Q&A]

Business database

Kubernetes is one of the most widely used platforms for running containerized applications. Many businesses though still run their databases in a more traditional environment.

Of course there's no reason why you can't run a database in Kubernetes and there are many advantages to doing so. We spoke to Karthik Ranganathan, founder and CTO of cloud-native database specialist Yugabyte, to discuss the pros and cons.

Continue reading

How businesses can improve their cyber resilience [Q&A]

endpoint protection

Governments are keen for enterprises to improve their cyber resilience, but research from Skurio finds just under half of private and public sector organisations surveyed say that lack of resources and in-house expertise prevent their organisation from keeping up with and protecting against new cyber threats.

We talked to Jeremy Hendy, CEO of Skurio, about the barriers to businesses becoming more cyber resilient and the calls to action for C-suite, info-security departments, and the industry

Continue reading

Log4j and why it's not safe to relax yet [Q&A]

The Log4j vulnerability first hit the headlines in December last year. Since then we've heard less about it, but it hasn't gone away, like most vulnerabilities it has a long tail.

A recent report from the Cybersecurity Safety Review Board takes a comprehensive look at the vulnerability and what can be learned from it.

Continue reading

Why security teams should prepare to slay the three-headed dragon [Q&A]

Governments, utilities and other key industries are prime targets for attack including from nation state actors and cybercriminals seeking to extract a ransom.

But David Anteliz, technical director at Skybox, believes that given the increase in tensions across the world threat actors will evolve their tactics with the use of a 'three-headed dragon approach' that goes beyond the probing we have seen so far.

Continue reading

How endpoint security and management are consolidating [Q&A]

Endpoint protection

Securing endpoints used to be a simple matter of installing a firewall and antivirus solution and then keeping them updated.

But as threats have become more sophisticated, networks more complex and working patterns have shifted away from the office, securing and managing endpoints has become a much greater problem for enterprises.

Continue reading

So you want to set up an IT support business? Here's what's really involved [Q&A]

With more businesses looking to outsource their support thanks to factors like skills shortages, there's clearly a demand for providing services like automation and remote monitoring and management tools.

But what does it take to set up an IT support business? And how does the idea live up to reality? We spoke to Dale Dawson, director of product at MSP platform Syncro to find out.

Continue reading

Addressing the cybersecurity talent shortage [Q&A]

talent

Cyber threats are growing in volume and sophistication, but efforts to combat them are being hampered by a shortage of cybersecurity skills.

One way of meeting that shortage is to look at upskilling and retraining within the current workforce. We spoke to Apratim Purakayastha, chief technology officer at Skillsoft, to find out more about how using innovative learning solutions can deliver the skills businesses need.

Continue reading

Do we need a cyber NATO to address the changing threat landscape? [Q&A]

security guards

The threat landscape facing enterprises is changing constantly. In recent months, major vulnerabilities like Log4j and malware-based threats have demonstrated the need for organizations to move quickly in order to defend themselves.

Is the best way to stay on top of the most pressing threats to harness the power of the global cybersecurity community for defense in a sort of cyber NATO? We talked to SOC Prime CEO Andrii Bezverkhyi to find out.

Continue reading

Quantum computing and its impact on cybersecurity [Q&A]

quantum computing

Quantum computing with its vastly improved processing capability offers the chance of many positive developments in research and science. But it also represents a potential threat to our current encryption models.

How big is quantum's threat to cybersecurity? And should we be taking action on this now? We talked to Skip Sanzeri, QuSecure co-founder and COO, to find out.

Continue reading

Now that 5G is becoming widespread what can we expect from 6G? [Q&A]

Mobile tracking

The 5G rollout is continuing, but technology companies, academics, service providers, and even governments are already starting to look ahead to the next generation of mobile technology.

So, what is 6G and what benefits will it offer over earlier standards? We spoke to Roger Nichols, 6G program manager at Keysight Technologies, to find out.

Continue reading

How no-code platforms are helping meet enterprise business challenges [Q&A]

According to a November Wall Street Journal article, Gartner predicts global revenue in the low-code application platforms market will exceed $14 billion by 2025. Also, in a Forrester Research poll earlier this year of over 1,800 corporate tech officials at global companies, roughly 37 percent say they currently use low-code, no-code or digital process automation tools.

No-code is undoubtedly having its time in the sun and looks to be here for the long term. We recently caught up with Vinod Kachroo, CEO of no-code technology platform Innoveo, to learn more about what's driving the demand for no-code and what kind of ROI companies can realistically anticipate from it.

Continue reading

What is the business metaverse and why should enterprises care? [Q&A]

The metaverse has triggered something of a buzz in recent months, particularly among big tech companies and wealthy investors.

But while the idea of a virtual world might be compelling for consumers, what does it mean for enterprises? We spoke to Nadir Ali, CEO of Inpixon to find out.

Continue reading

DevSecOps and the importance of threat modeling [Q&A]

In the past security has been something that was added only at the end of the development process. But as release cycles have accelerated this is no longer a viable approach.

DevSecOps (development, security and operations) is all about automating the integration of security at every phase of the software development lifecycle.

Continue reading

Why a people-centric culture is critical to security, growth and transformation [Q&A]

students with laptops

Digital transformation is still very much flavor of the month, and businesses face an increasing level of cyber threats. But what is sometimes overlooked is that these things aren't all about technology.

People are an important part of the equation too, driving change and reacting to events. We spoke to James Harrison, head of UK at Telstra, to find out more about why it's important to build a corporate culture that doesn't neglect the human angle.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.