How software descriptions can open the door to cyberattacks [Q&A]


The use of SaaS-based applications and systems has taken off in recent years, but that surge has highlighted a problem in the form of a lack of standardization for software descriptions across all types of systems.
This makes it much harder for IT teams to assess vulnerability levels across all the packages in an enterprise. But what risks does this pose and how can businesses tackle the problem? We spoke with Peter Lund, VP at operational technology cybersecurity company Industrial Defender, to discover more.
How to measure the value of cybersecurity [Q&A]


With high profile cyber attacks and data breaches continuing to make the news, security is at the top of the priority list for businesses.
But how do you know that the resources you put into cybersecurity are providing a good return on the investment? We spoke with Oliver Rochford, security evangelist at Securonix to find out.
How enterprises can ensure sustainability in their IT supply chains [Q&A]


We recently reported on a study showing that IT leaders are willing to pay more for systems and providers that have a commitment to sustainability. And with the COP26 climate conference in full swing there's increased focus on reducing our impact on the planet.
But how can enterprises properly vet their supply chain to ensure the businesses they’re dealing with are adhering to the appropriate standards? We spoke with Martin Thompson, founder of the ITAM Forum -- a body that promotes the IT asset management industry -- to find out.
The importance of a modern approach to information management [Q&A]


Information is now a critical asset for businesses, but it's only of real value if you can manage and access it efficiently.
More and more data now is in an unstructured form too, so has the way we manage information changed, and what do businesses need to do to make the most of it to inform their day-to-day decisions? We spoke to Antti Nivala, founder and CEO of M-Files to find out.
Tackling the problem of Active Directory misconfigurations [Q&A]


Microsoft's Active Directory is used by many businesses as a way of managing identity services and controlling access.
But if it's not configured correctly it can lead to security risks. But how dangerous is this and what can enterprises do to keep themselves safe? We spoke to Andy Robbins, technical product architect at SpecterOps to find out.
The challenges for developers in the medical device sector [Q&A]


Across all industries developers are under pressure to deal with rapidly shifting requirements and faster turn around times.
But in highly regulated sectors like healthcare there are extra demands to ensure safety and compliance. We spoke to Roger Mazzella, senior product manager, medical at productivity platform The Qt Company to find out how developers can address these challenges while still meeting delivery times.
How software engineers can avoid burnout [Q&A]


Managing burnout isn't easy at the best of times, and with the extra stress created by the pandemic, it’s more difficult than ever. With the ubiquitous shift to remote working, people are more isolated and struggling to separate their home lives from work.
Grappling with this 'new normal' has been challenging across the board. For software engineers -- professionals who are historically prone to burnout -- it's been especially hard.
The increasingly critical role of data in the enterprise [Q&A]


The importance of data has increased exponentially in recent years, for businesses of all sizes. But there are increasing challenges too, posed by privacy regulation, alternative data and more.
We spoke to Or Lenchner, CEO of Bright Data to find out more about the key role of data in the enterprise and how businesses can use it effectively.
Conversational AI and customer experience [Q&A]


These days when you contact a company online it can be hard to know if you're dealing with an actual person or with an AI bot.
Clearly AI has a role to play in automating repetitive tasks and answering straightforward queries. But can it really have a wider role to play in improving customer experience? We spoke to Derek Roberti, VP of technology at Cognigy, a global conversational AI platform provider, to find out.
How to get your business ransomware ready [Q&A]


Taking proactive measures like updating and patching systems promptly and undertaking penetration testing improves the ability to withstand a targeted attack.
But when security teams are flooded with non-critical alerts 'vulnerability fatigue' can set in. We spoke to Amitai Ratzon, CEO of penetration testing specialist Pentera, to find out how enterprises can avoid this and improve their ransomware readiness.
Is it time to rethink data centralization to aid cybersecurity investigations? [Q&A]


Security Information and Events Management (SIEM) has become the keystone of many organizations' security strategies in recent years.
But is it effective? And in the era of greater cloud and SaaS use, is the time right for the concept of SIEM to undergo a radical rethink? Andrew Maloney, COO and co-founder at security investigation specialist Query.AI thinks it is. We spoke to him to learn more.
Why data quality is essential to business success [Q&A]


Enterprises are increasingly reliant on data, but it's only really useful if its quality can be assured. With growing volumes though maintaining data quality and compliance is a big challenge.
We spoke to Rex Ahlstrom, chief strategy and technology officer at Syniti to find out how businesses can improve and maintain the quality of their data and how this can benefit them.
The changing face of digital identity verification [Q&A]

The security challenges of widespread container use [Q&A]


Containers have provided greater flexibility and enabled developers to think less about their infrastructure. However, securing them presents a challenge.
Traditional workload protection technologies designed for static workloads don't work well on minimized, ephemeral container workloads. There's also increased use of open source software that presents additional risks.
Why businesses need to take vulnerability and risk management seriously [Q&A]


As businesses rely more on the cloud and virtual infrastructure, so the potential for both configuration errors and cyberattacks increases.
The pandemic has only made the problem worse and in many cases led to a loosening of security policy. What do organizations need to do to address the issue and protect their systems? We spoke to Tal Morgenstern, Vulcan Cyber CPO and co-founder, to find out.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.