Why SaaS security needs to have a higher profile [Q&A]


Increasing numbers of apps are moving to an SaaS model and containers, but the security of these applications doesn't always get much attention.
We spoke to BetterCloud CEO, David Politis who believes that SaaS security is an area that businesses need to take much more seriously.
The business case for zero trust network access [Q&A]


As the business network landscape has become more complex, many organizations are turning to zero trust network access (ZTNA) in order to boost their security. It's also replacing or supplementing older technologies like VPN.
We spoke to Kurt Glazemakers, CTO at secure access specialist Appgate who believes that there is a solid business case for ZTNA as well as a security one.
Data privacy and consent in the age of CCPA, GDPR and impending federal privacy law [Q&A]


When it comes to consent and data privacy, the rise of regulations like the General Data Protection Regulation (GDPR), along with increased consumer awareness of data infractions and breaches, has raised the stakes.
When the California Consumer Privacy Act (CCPA) passed in 2018, many states began following California's lead. Currently, more than 30 states have comprehensive privacy bills that are close to passing or in early stages of being drafted.
Why changing legislation means companies need to rethink their data protection [Q&A]


Businesses have embraced the use of data to drive decisions and digital transformation. In many cases consumers are happy to have their details captured too, as long as they benefit from it.
But as more and more countries introduce privacy and data protection legislation, and as California clarifies some of its cookie-based tracking definitions, and increases enforcement of both intentional and unintentional violations under CCPA, enterprises need to tighten up their data handling.
The threat of ransomware through Active Directory [Q&A]


Ransomware has hit the headlines in recent months with attacks on infrastructure and supply chains closing down operations. But ransomware has the potential to be even more devastating if it’s spread via Active Directory, as demonstrated by the SolarWinds attack.
We talked to Derek Melber, chief technology and security strategist of Tenable to find out more about AD attacks and how to combat them.
Why enterprises need to make the shift to DevSecOps now [Q&A]

Adopting best practice approaches for hybrid working [Q&A]


More and more businesses are moving to a hybrid work model. But while this approach can offer improved value along with the tools to drive the business forward, it can also present a number of challenges.
So what does it take to succeed with a hybrid approach? We spoke to Cisco Webex's Lorrissa Horton to find out.
Digital forensics in modern cloud environments [Q&A]


Increasingly applications and infrastructure are moving to the cloud and containers. But although this offers convenience and cost savings it introduces challenges when security incidents occur.
We spoke to James Campbell, CEO and co-founder of Cado Security to find out about the importance of digital forensics when dealing with cloud system breaches.
How technical debt is harming API security [Q&A]


APIs allow the easy exchange of information between apps, microservices and containers. They've become an essential part of the way our digital infrastructure operates.
But the very ubiquity of APIs means developers are under pressure to produce them quickly and that can lead to 'technical debt' because corners are cut. We spoke to Tom Hudson, security research tech lead at app vulnerability scanner Detectify to find out more about why APIs are vulnerable in this way and how they can be secured.
Why supply chain security blind spots put enterprises at risk [Q&A]


Many recent cyberattacks have focused on the software supply chain, with SolarWinds being perhaps the most high profile example.
Businesses can often have a blind spot when it comes to the supply chain and this can have catastrophic consequences. We spoke to Todd Carroll, CISO of CybelAngel to learn more about the problem and what companies can do to keep themselves safe.
Protecting Kubernetes from ransomware [Q&A]


Many organizations have been quick to adopt containerization and particularly Kubernetes. But while there are advantages in scale and flexibility, it also raises issues around cloud-native data protection practices.
So how can businesses adopt the technology but still protect their information? We spoke to Gaurav Rishi, VP product, at Kubernetes backup specialist Kasten by Veeam to find out.
How 'bending reality' can deliver business success [Q&A]


What makes tech pioneers successful? What’s the key to becoming a business billionaire? Leadership adviser Victoria Song thinks it's because they have the ability to 'bend reality' to what they want it to be.
What's more she believes that with a simple meta-framework that underlies peak performance, self-development, and meditation anybody can become a success in the same way.
With the rise of zero trust, is the VPN really dead? [Q&A]


As a big chunk of the world suddenly started to work from home during the pandemic, many companies turned to VPNs as a means of securing remote access.
However, as more systems are now in the cloud and secured using zero trust network access (ZTNA) is the age of the VPN over? We spoke to Robert Byrne, field strategist at One Identity to find out.
Ensuring compliance takes a front seat when using collaboration tools [Q&A]


One effect of the pandemic shift to working from home has been a surge in the use of collaboration platforms. Microsoft Teams alone just exceeded 250 million monthly active users.
But a new whitepaper from Theta Lake and Osterman Research, Archiving And Data Protection With Microsoft Teams, brings to light the strengths and weaknesses of native archiving and data protection in Microsoft Teams and why firms look to third-party solutions to address coverage gaps.
Data governance -- balancing security against risk [Q&A]
Recent Headlines
Most Commented Stories
Betanews Is Growing Alongside You
Only a fool still uses Windows 7
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.