Articles about Q&A

Conversational AI and customer experience [Q&A]

These days when you contact a company online it can be hard to know if you're dealing with an actual person or with an AI bot.

Clearly AI has a role to play in automating repetitive tasks and answering straightforward queries. But can it really have a wider role to play in improving customer experience? We spoke to Derek Roberti, VP of technology at Cognigy, a global conversational AI platform provider, to find out.

Continue reading

How to get your business ransomware ready [Q&A]

Ransomware

Taking proactive measures like updating and patching systems promptly and undertaking penetration testing improves the ability to withstand a targeted attack.

But when security teams are flooded with non-critical alerts 'vulnerability fatigue' can set in. We spoke to Amitai Ratzon, CEO of penetration testing specialist Pentera, to find out how enterprises can avoid this and improve their ransomware readiness.

Continue reading

Is it time to rethink data centralization to aid cybersecurity investigations? [Q&A]

Data security watch face

Security Information and Events Management (SIEM) has become the keystone of many organizations' security strategies in recent years.

But is it effective? And in the era of greater cloud and SaaS use, is the time right for the concept of SIEM to undergo a radical rethink? Andrew Maloney, COO and co-founder at security investigation specialist Query.AI thinks it is. We spoke to him to learn more.

Continue reading

Why data quality is essential to business success [Q&A]

Laptop collecting data

Enterprises are increasingly reliant on data, but it's only really useful if its quality can be assured. With growing volumes though maintaining data quality and compliance is a big challenge.

We spoke to Rex Ahlstrom, chief strategy and technology officer at Syniti to find out how businesses can improve and maintain the quality of their data and how this can benefit them.

Continue reading

The changing face of digital identity verification [Q&A]

As we've grown more and more reliant on the internet to carry out everyday transactions, proving who we are has become a major issue.

We are still heavily dependent on IDs, passwords and supplementary security questions, but all of these are open to abuse leading to the risk of identity theft.

Continue reading

The security challenges of widespread container use [Q&A]

Containers have provided greater flexibility and enabled developers to think less about their infrastructure. However, securing them presents a challenge.

Traditional workload protection technologies designed for static workloads don't work well on minimized, ephemeral container workloads. There's also increased use of open source software that presents additional risks.

Continue reading

Why businesses need to take vulnerability and risk management seriously [Q&A]

Risk dial

As businesses rely more on the cloud and virtual infrastructure, so the potential for both configuration errors and cyberattacks increases.

The pandemic has only made the problem worse and in many cases led to a loosening of security policy. What do organizations need to do to address the issue and protect their systems? We spoke to Tal Morgenstern, Vulcan Cyber CPO and co-founder, to find out.

Continue reading

The changing role of developers in the enterprise [Q&A]

Developer team

Recent trends such as cloud, open-source software and low-code platforms have led to radical changes in the role of developers.

But what exactly is the effect of these changes and how can development teams prepare for them and take advantage of the opportunities they offer? We spoke to Bob Quillin, chief ecosystem officer at modernization platform vFunction, to find out.

Continue reading

How location technology and zero factor authentication could change the security landscape [Q&A]

The death of the password has been predicted for a long time, but although it's been augmented by things like multi-factor authentication and biometrics, it still clings to life.

However, businesses are looking for ways to eliminate fraud without impacting the customer experience. One way to do this is to use location technology to provide ‘zero factor’ authentication, allowing businesses to protect themselves and their customers without disrupting the customer experience.

Continue reading

The future of storage and how data volumes are driving change [Q&A]

There have been rapid increases in storage capacity in recent years, but the way the technology is used is largely unchanged. We still load data from storage into memory, process it, and write out any changes.

But as storage grows into petabytes this model will become harder to sustain. The future of storage will require abstraction layering and heterogeneous computing, allowing for scale, but reducing over-sophistication.

Continue reading

The changing face of fraud and how artificial intelligence is helping to counter it [Q&A]

Robot hacker

Financial crime is on the increase and attackers must be stopped in their tracks. Financial service organizations new and old need to ensure they have the right technology in place to predict, detect and deter fraud, whilst ensuring minimal disruption to the customer journey.

We spoke to Martin Rehak, CEO of Resistant AI to find out how sophisticated artificial intelligence can detect known criminal practices and more importantly, predict the unknown emerging patterns of financial crime.

Continue reading

The impact of DDoS attacks on the enterprise [Q&A]

DDoS attacks

With the UK and US being amongst the top four most targeted nations for network DDoS attacks during the first half of 2021, this is clearly a problem that hasn't gone away amid all the pandemic-related news.

We spoke to David Elmaleh, senior product manager, Edge Services at Imperva. to discuss the impact DDoS attacks can have and why it's essential for organizations to monitor for anomalies relating to unexplained traffic spikes.

Continue reading

How banks are strengthening their cybersecurity posture [Q&A]

online banking

Cyberattacks and data breaches affect all kinds of organizations, but banks and financial services firms are at particular risk.

The shift to using mobile devices to carry out financial transactions has changed the threat landscape in recent years too. We spoke to Will LaSala, director of security solutions and security evangelist at OneSpan to find out more about what banks can do to bolster their security.

Continue reading

SIEM, SOAR and their role in improving cloud security [Q&A]

Cloud data security

It's increasingly common for enterprise systems to be in the cloud rather than in-house, but that throws up a whole range of new challenges when it comes to securing them.

We spoke to Dario Forte, vice president and general manager, security orchestration, at cloud management specialist Sumo Logic to find out more about what's involved in cloud security and how automation can help.

Continue reading

Why quantum computing is a security threat and how to defend against it [Q&A]

quantum computing

Quantum computing offers incredible computing power and is set to transform many areas such as research. However, it also represents a threat to current security systems as cracking passwords and encryption keys becomes much easier.

So quantum is a security threat, but is there a solution to making systems safer? We spoke to David Williams, CEO of symmetric encryption specialist Arqit, to find out.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.