Lessons the military can bring to cybersecurity [Q&A]


The ongoing struggle between good and bad actors in the cyber world has often been compared to a battle or warfare. More recently the threat of nation state attacks on critical infrastructure has led to more actual military interest in the cyber arena, as we've seen in Ukraine.
The Israel Defense Force's 8200 unit is often referred to the SEALs or SAS of cyber military units and its veterans are driving many of Israel's tech start ups.
How hybrid work will fuel the adoption of DaaS [Q&A]


Hybrid work is here to stay, and as companies deploy virtual desktops to enable work from anywhere, IT teams are increasingly challenged with securing their network and sensitive data.
We spoke with Tim Minahan, executive vice president of business strategy at Citrix, about how work has changed and how the technologies and policies used to support it need to change with it.
The challenges of vulnerability management [Q&A]


Recent vulnerabilities like Log4j have highlighted how difficult it can be to manage risks and ensure that software patches are kept up to date.
We spoke to Rob Gurzeev, CEO of attack surface management specialist CyCognito, to discuss the challenges involved and how to deal with them.
Why enterprises need to consolidate their cybersecurity efforts [Q&A]

The problem with AI model failure and how to avoid it [Q&A]


It's tempting to look at the hype surrounding AI and see it as a solution to all problems. But AI isn't perfect, there have been some notable failures, often due to poorly defined models.
What are the consequences of getting it wrong, and how can businesses ensure their AI projects stay on track? We spoke to Alessya Visnjic, CEO of AI observability specialist WhyLabs to find out.
The challenge of hiring cyber talent in the Great Resignation [Q&A]


Whether it's been triggered by the pandemic or other factors, the Great Resignation has led to new problems for businesses when it comes to finding and retaining staff.
This has been a particular problem in the tech sector where employees tend to be quite mobile anyway. We spoke to Amar Kanagaraj, founder and CEO of Protecto, to find out how businesses can meet the challenges of hiring tech talent.
How PSD2 is changing open banking [Q&A]


Compliance with the EU Payments Services Directive (PSD2) is the next key milestone in the continued evolution of open banking. This evolution involves a new set of rules that will change how we confirm our identity when making purchases online.
The implementation of strong customer authentication (SCA), on top of existing open banking capabilities, will require merchants and payment service providers (PSPs) to work together with technology suppliers, card schemes and many others to deliver SCA in a way which works well for customers.
Leadership and technology tips for running a remote company successfully [Q&A]


When the world shut down in March 2020, many of us envisioned a two-week work-from-home stint, followed by a prompt return to office life. Little did we know that the business world, as we knew it, would change forever.
At the start of the COVID-19 pandemic, the overnight shift to a remote workforce was done out of necessity. But, over the past two years, companies have realized that this new operations model can have many business benefits, including cost savings associated with physical office space and a better work/life balance for employees.
Do traditional antivirus solutions still have a role in the age of AI? [Q&A]


Antivirus software was one of the earliest cybersecurity solutions, with the first commercial programs appearing in the 1980s, and it remains at the core of protecting computer systems today.
But as threats evolve and become more sophisticated, does traditional antivirus still have a role to play or will it be overtaken by technologies like artificial intelligence?
How data storage demands will drive edge computing growth [Q&A]


Enterprises are producing larger and larger amounts of data and as they deploy more IoT, edge and 5G devices the volume is only likely to increase.
This puts more pressure on storage capacity which has the potential to be an inhibiting factor in digital transformation. We spoke to Dr Tong Zhang, co-founder and chief scientist at ScaleFlux, to learn more about the importance of storage to enterprise IT plans and infrastructure.
The road ahead for artificial intelligence [Q&A]


There has been a lot of buzz surrounding the adoption of artificial intelligence. According to a recent report from McKinsey 57 percent of companies are now using AI in at least one function. But how much is hype and how much is built on a sound commercial base?
We spoke to Mike Loukides, VP of emerging tech content at O'Reilly Media and author of O'Reilly Media's widely-cited AI Adoption in the Enterprise report, to discuss the current state of AI and what lies ahead.
Why Kubernetes deployment needs a security first mindset [Q&A]


Kubernetes has been at the forefront of container deployment, allowing the automation of development, scaling and management, and supported on a wide range of public cloud platforms.
But as with any cloud deployment there are potential risks from mis-configuration, poorly managed access privileges and more. It's important therefore that when deploying Kubernetes security is given top priority.
How enterprises can boost security with vulnerability management [Q&A]


Cyberattacks come in many different forms and it’s important for businesses to understand where they're vulnerable in order to mount an effective defense.
We spoke to Ed Williams, cybersecurity specialist at Trustwave, to find out more about vulnerability management, why it's important and how it fits into an organization's overall security strategy.
Protecting voice communications from fraud and deep fakes [Q&A]


The UK's National Computer Security centre (NCSC) has recently issued new guidance on secure communications for voice and video calls and SMS in order to help protect consumers from scams.
UK telecoms regulator Ofcom has also announced a crackdown on scam phone calls using fake numbers as their volume has soared during the pandemic.
How to address the security risks of cloud migration [Q&A]


Cloud is an enabler of productivity and provides the infrastructure which supports modern distributed workforces. But it also poses a serious security risk to businesses that are unprepared to cope with modern threats. Figures from 451 Research show that 40 percent of organizations have experienced a cloud-based data breach in the past 12 months.
Organizations are spending millions on firewalls, endpoint protection and other security measures. What these organizations are missing, however, is visibility and control of security policies that govern 'what can talk to what' and 'who can talk to who' across the entire organizational infrastructure, including on-premise, cloud-native, and hybrid cloud. This creates security blind spots and misconfigurations.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.