Artificial intelligence

The rise of the digital coworker [Q&A]

Talent shortages are affecting many industries at the moment and increasingly enterprises are turning to technologies like robotic process automation (RPA) to fill the gaps.

Now there's a new alternative in the form of the 'digital coworker', designed to work seamlessly alongside a company's human workforce. We spoke to Chaz Perera, CEO and co-founder of Roots Automation, to discover more about this latest innovation.

By Ian Barker -
Network

If you don't know what you're exposing, how can you protect it? [Q&A]

The move to the cloud has meant the days of external exposure being defined by the set of IP ranges in your firewall are gone. Today's attack surface is made up of many internet-facing assets with exposure being controlled at the domain level.

This means web applications have fast become an attractive target for attackers, particularly unknown and forgotten assets -- which are plentiful in modern environments. So how can businesses defend themselves?

By Ian Barker -
disagreement

Rebuilding trust between developers and security [Q&A]

The demands of modern business IT environments can often lead to friction between developers and security teams which can hamper the successful rollout of cloud security.

Developers want to deliver features as fast as possible and security teams want things to be as secure as possible, so there is constant conflict of interest. We spoke to David Hendri, CTO and co-founder of cloud security startup Solvo, to discover how to rebuild the trust between developers and security by creating a common language.

By Ian Barker -
CISO

Service mesh and the CISO [Q&A]

The number of use cases for Kubernetes is expanding as an increasing number of enterprises across a wide array of industries are adopting it as their platform of choice. However, this also expands the enterprise attack surface and business risk as a result.

We spoke to William, Morgan CEO of Buoyant, about how CISOs are coming face-to-face with the insecurity that can arise from managing Kubernetes platforms. They are beginning to see the risks that can unfold as well as how a service mesh can support a security stack.

By Ian Barker -
Network security

Keeping attackers out of the 'atomized network' [Q&A]

As the network as we know it has changed and adversaries are finding success with new attack routes that exploit gaps in defenses.

As enterprise security undergoes a major shift we need to change the way we think about this complex 'atomized network'. We spoke to Martin Roesch, CEO of Netography, to find out about the challenges this presents and how to address them.

By Ian Barker -
Cloud data security

Meeting the challenge of securing cloud-native apps [Q&A]

As more and more of our computing moves to the cloud, protecting information and apps throws up a new set of challenges for enterprises.

We spoke to Ratan Tiperneni, president and CEO of cloud-native app protection specialist Tigera, to find out more about the security implications of going cloud native and how to deal with them.

By Ian Barker -
Two Military Men Walking in Data Center Corridor

Taking a battlefield approach to cybersecurity [Q&A]

You'll often hear cybersecurity discussed in military terms, as a war, or a battle, or a conflict. So should enterprises be taking a defensive approach that draws on military thinking?

Tom Gorup is VP of security operations at Fortra's Alert Logic, a managed detection and response specialist. He's also a veteran of six years in the US Army with tours of Iraq and Afghanistan. We spoke to him to discover how lessons learned on the battlefield can be applied to cybersecurity.

By Ian Barker -
safe vault lock

Protecting backups from ransomware [Q&A]

Cybercriminals know that backups are the last line of defense against ransomware, so it’s essential that they are properly protected.

In an ideal world they would be air-gapped but in the current era of hyperconnectivity that can prove somewhat impractical. We talked to Bret Piatt, CEO of CyberFortress, to discuss the need to protect backups and the strategies for doing so.

By Ian Barker -
Business security

Why your security strategy needs to be pre-emptive [Q&A]

As cyberattacks become more sophisticated, so traditional security techniques may no longer be up to the task of protecting systems.

What's needed is an approach that can spot the routes an attacker may use and help close them down. We spoke to Todd Carroll, CISO at CybelAngel and with over 20 years previous experience in the FBI's cyber, counter intelligence, and counter terrorism branches, to discuss the need for a pre-emptive attitude to cybersecurity and how such an approach can work.

By Ian Barker -
Web development and coding. Cross platform development website. Adaptive layout internet page or web interface on screen laptop, tablet and phone. Isometric concept illustration.

Why cross-platform capability is vital to the future of development [Q&A]

Increasingly consumers and businesses alike are relying on portable devices, and that means it's important that apps are available across several different systems.

We spoke to Jerome Laban, CTO of Uno Platform -- which allows Microsoft developers, using traditional C# and XAML, to take their apps to iOS, Android, Mac, Linux, and the web -- to find out more about cross-platform development and how it can future-proof applications.

By Ian Barker -
SaaS

Why SaaS needs a holistic approach to security [Q&A]

As organizations move more of their systems to the cloud they face a new range of threats. This combined with a shortage of cybersecurity skills makes securing SaaS systems a challenge.

Galit Lubetzky Sharon, co-founder and CTO of Wing Security, believes that a new more holistic approach, involving employees across the organization, is needed. We spoke to her to learn more.

By Ian Barker -
Apple laptop

Fueling the Apple BYOD revolution [Q&A]

It's no secret that BYOD provides incredible benefits on paper -- from increased productivity to more flexibility and streamlined output. But unfortunately, many initiatives fail to take off due to security and privacy concerns.

Mosyle CEO Alcyr Araujo believes this doesn't always have to be the case, and that Apple devices are primed to offer the best balance for BYOD. We spoke to him to find out more.

By Ian Barker -
Compliance gauge

Ensuring compliance through network automation [Q&A]

Cyber threats are on the rise across every industry and business size, highlighting the importance of maintaining network compliance for organizations and especially for IT and security teams.

But that's easier said than done, with many industry-specific compliance regulations like the Health Insurance Portability and Accountability Act (HIPAA) or the Payment Card Industry Data Security Standard (PCI) each with their own set of standards and processes.

By Ian Barker -
privacy key

Data privacy and the changes enterprises need to be ready for [Q&A]

It has been estimated that there are some 43 zetabytes of data stored by enterprises today that are inaccessible and not commercialized due to privacy concerns, operational complexity and regulations.

With the California Consumer Privacy Act (CCPA) becoming fully operational on January 1 2023 and other legislation in place or coming around the world, the need for businesses to find new data accessibility methods that are compliance-friendly is very real.

By Ian Barker -
cloud confusion

All you need to know about SASE and SSE but never dared ask [Q&A]

The cybersecurity industry loves a good acronym and in recent times SASE and SSE have been among the ones to grab popular attention.

But in many cases a number of disparate technologies have been patched together to fulfill the promise of a unified solution for securing and accessing the service edge. Often this has occurred through company acquisitions.

By Ian Barker -
Load More Articles