Articles about Q&A

The challenges of fully remote work environments [Q&A]

home working security

Prior to the pandemic, only six percent of employees worked remotely. In tech, and specifically cyber, though that number is considerably higher.

But what benefits and challenges do high levels of remote working present? We spoke to DNSFilter CEO and co-founder, Ken Carnesi to find out.

Continue reading

Why automation is the future of incident response [Q&A]

Automation

A security breach can lead to serious reputational and legal issues for enterprises. The speed and effectiveness with which they are able to respond to incidents is therefore crucial.

Larry Gagnon, senior vice president, global incident response at eSentire, believes that the way to address this is by greater automation incident response. We talked to him to find out more.

Continue reading

How data can help overcome the challenges of hybrid working [Q&A]

Of the many challenges thrown up by the pandemic, the switch to remote working has perhaps been one of the most significant.

How have organizations coped with this change, what will the long term effects be and what's the role of data in making hybrid work possible? We spoke to Mark Devereux, CTPO of Scalable Software, to find out.

Continue reading

Automating networks for whatever comes next [Q&A]

remote working

Digital transformation and modernization of IT is sweeping across many organizations at the moment. But one aspect that's sometimes neglected is their impact on networks.

How can enterprises scale their networks to cope with change and what part can automation play in the mix? We spoke to Ernest Lefner, chief product officer at Gluware, and co-founder and former co-chairman of ONUG (Open Network User Group), to find out.

Continue reading

How artificial intelligence and machine learning are changing the development landscape [Q&A]

Artificial intelligence

It's an increasingly rare application these days that doesn’t claim to incorporate some form of artificial intelligence or machine learning capability.

But while this may be great from a marketing standpoint it does pose a challenge for developers. We spoke to Luis Ceze, CEO and co-founder of OctoML, to find out more.

Continue reading

The role of encrypted traffic analysis for threat detection [Q&A]

Everyone is striving to make their systems more secure and in many cases that means adopting encryption in order to protect data.

But the use of encrypted traffic over networks presents a headache for security teams as malicious content can be harder to detect. We spoke to Thomas Pore, director of security products at Live Action, to find out more about the problem and how it can be addressed.

Continue reading

What is needed to make digital transformation work? [Q&A]

Digital transformation

Digital transformation is a topic that's been in the air for more than just a few years now, but the impact of the pandemic and the need for businesses to adapt has rapidly brought it back to the forefront.

It's also no longer just about IT. Digital transformation is an enterprise-wide endeavor, connecting and affecting all business units and requires a shift in mindset to take full advantage of the opportunities it offers.

Continue reading

What is unified observability and why is it important? [Q&A]

There has been much discussion around observability in the past few months. With the adoption of hybrid work models and cloud systems, IT leaders have quickly realized the business and security value of creating transparency within their existing tech infrastructure.

Digital experience company Riverbed has announced a business move towards a market it's calling 'unified observability'. The company's vice-president Mike Marks spoke to us about the unified observability concept, why it's integral to IT decision-makers' strategies and offers some thoughts on how enterprises can begin integrating it within their current operations.

Continue reading

Unlocking the hidden resources that could solve the cyber skills crisis [Q&A]

home working

There was already a shortage of cyber skills before the COVID-19 pandemic hit, and since then we've had a perfect storm of home working and the Great Resignation to make things worse still.

But is there an unexploited resource out there that could help fill the skills gap? Sonny Sandelius, assistant director of workforce programs at cyber security training skills company SANS believes there could be in the form of an army of the hobbyists and DIYers.

Continue reading

Ensuring compliance in the modern enterprise [Q&A]

Compliance gauge

An increasing volume of regulations surrounding the security and privacy of data have been implemented in recent years. This represents a challenge for businesses that need to ensure they remain compliant.

The challenge has become even greater due to the pandemic and the consequent shift in working patterns. So how can enterprises ensure that they remain compliant and don't fall foul of the rules?

Continue reading

The challenge of guarding against supply chain attacks [Q&A]

Broken chain

In recent years we've seen a trend towards attacks targeting the software supply chain rather than being directly against businesses.

Attacks can include poisoning the software components, stealing secrets to compromise an account, or modifying code repositories to allow for exploits.

Continue reading

Why the time is right for enterprises to consider edge computing [Q&A]

The technology world never stands still for very long and keeping in touch with trends is important if you're not to be left behind.

In recent years we've seen moves to the cloud and to DevOps, trends which show no signs of slowing down. But there's now a trend towards putting computing power at the edge, closer to the users.

Continue reading

The CSO's new seat at the executive table and how to use it [Q&A]

Boardroom

With the changes to working patterns brought about by the pandemic and increasing levels of cyberattacks, the role of the Chief Security Officer (CSO) in businesses has become more challenging.

These things have also led to a boost in the status of CSOs within their organizations. We spoke to Chaim Mazal, CISO and SVP of engineering for Apple device management platform Kandji to find out more about how things have changed and how CSOs can make the most of their new influence to drive security strategy.

Continue reading

How you can take back control of your online data [Q&A]

Wiping data

If you use the internet then it's certain that some organization somewhere is storing data about you. Indeed research shows that people are happy to share information in exchange for a better consumer experience.

However, that data is still yours, so how can you understand what information you're giving away and how can you take better control?

Continue reading

Developing smart tools for Windows -- the man behind CCleaner and Tweakeze [Q&A]

code

Heitor Tome is the man behind a new tool called Tweakeze which is designed to prevent unwanted changes to your computer.

But he also has a long history as the chief architect and software engineer behind popular cleanup program CCleaner -- indeed for several years he was its sole developer.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.