Articles about Q&A

Adopting best practice approaches for hybrid working [Q&A]

home working

More and more businesses are moving to a hybrid work model. But while this approach can offer improved value along with the tools to drive the business forward, it can also present a number of challenges.

So what does it take to succeed with a hybrid approach? We spoke to Cisco Webex's Lorrissa Horton to find out.

Continue reading

Digital forensics in modern cloud environments [Q&A]

Increasingly applications and infrastructure are moving to the cloud and containers. But although this offers convenience and cost savings it introduces challenges when security incidents occur.

We spoke to James Campbell, CEO and co-founder of Cado Security to find out about the importance of digital forensics when dealing with cloud system breaches.

Continue reading

How technical debt is harming API security [Q&A]

api

APIs allow the easy exchange of information between apps, microservices and containers. They've become an essential part of the way our digital infrastructure operates.

But the very ubiquity of APIs means developers are under pressure to produce them quickly and that can lead to 'technical debt' because corners are cut. We spoke to Tom Hudson, security research tech lead at app vulnerability scanner Detectify to find out more about why APIs are vulnerable in this way and how they can be secured.

Continue reading

Why supply chain security blind spots put enterprises at risk [Q&A]

supply chain

Many recent cyberattacks have focused on the software supply chain, with SolarWinds being perhaps the most high profile example.

Businesses can often have a blind spot when it comes to the supply chain and this can have catastrophic consequences. We spoke to Todd Carroll, CISO of CybelAngel to learn more about the problem and what companies can do to keep themselves safe.

Continue reading

Protecting Kubernetes from ransomware [Q&A]

Ransomware

Many organizations have been quick to adopt containerization and particularly Kubernetes. But while there are advantages in scale and flexibility, it also raises issues around cloud-native data protection practices.

So how can businesses adopt the technology but still protect their information? We spoke to Gaurav Rishi, VP product, at Kubernetes backup specialist Kasten by Veeam to find out.

Continue reading

How 'bending reality' can deliver business success [Q&A]

success v failure

What makes tech pioneers successful? What’s the key to becoming a business billionaire? Leadership adviser Victoria Song thinks it's because they have the ability to 'bend reality' to what they want it to be.

What's more she believes that with a simple meta-framework that underlies peak performance, self-development, and meditation anybody can become a success in the same way.

Continue reading

With the rise of zero trust, is the VPN really dead? [Q&A]

VPN tiles

As a big chunk of the world suddenly started to work from home during the pandemic, many companies turned to VPNs as a means of securing remote access.

However, as more systems are now in the cloud and secured using zero trust network access (ZTNA) is the age of the VPN over? We spoke to Robert Byrne, field strategist at One Identity to find out.

Continue reading

Ensuring compliance takes a front seat when using collaboration tools [Q&A]

Collaboration

One effect of the pandemic shift to working from home has been a surge in the use of collaboration platforms. Microsoft Teams alone just exceeded 250 million monthly active users.

But a new whitepaper from Theta Lake and Osterman Research, Archiving And Data Protection With Microsoft Teams, brings to light the strengths and weaknesses of native archiving and data protection in Microsoft Teams and why firms look to third-party solutions to address coverage gaps.

Continue reading

Data governance -- balancing security against risk [Q&A]

Data governance

Data is the lifeblood of businesses, but managing it effectively and keeping it secure presents some significant challenges.

How do you ensure that you have the latest information for example? And how can you be certain your compliance procedures are up to date?

Continue reading

Why threat intelligence is key to the future of cybersecurity [Q&A]

As threats continue to evolve security vendors must keep up. This means having up to date information and being able to act on it quickly.

The key to this is effective threat intelligence. We spoke to Anuj Goel, co-founder and CEO of Cyware to find out more about threat intelligence and why sharing is key to making the most of it.

Continue reading

Why unintentional insider data leaks are still a problem for businesses [Q&A]

Insider threat

Whilst threats to data are often seen as being down to external actors, it's often the case that leaks, both intentional and otherwise, can come from insiders.

Unintentional or accidental leaks remain a major problem, and one that’s been made worse thanks to more home working. We spoke to Rajan Koo, SVP, engineering and cyber intelligence at DTEX Systems to learn more about this type of threat and how businesses can address it.

Continue reading

The challenges of securing Active Directory [Q&A]

security meter

As we saw in the recent SolarWinds attack, Active Directory can be exploited as a means of attacking corporate networks.

But why is AD such an attractive target? And why are companies struggling to secure it even though it's hardly a new technology? We spoke to Carolyn Crandall, chief security advocate at AttivoNetworks to find out.

Continue reading

The underground marketplaces behind cybercrime [Q&A]

hacker laptop

In the last few decades, we've seen cybercrime transform from an activity perpetrated by independent lone actors into an increasingly professional business endeavor in pursuit of profit.

Cybercriminals communicate and collaborate, working together and exchanging information on the deep and dark web. But what exactly is up for sale on these underground markets and what does this tell us about threat actor behavior and motivation?

Continue reading

How security teams can build a strong IT partnership for zero trust implementation [Q&A]

As the enterprise IT landscape has become more complex, security is no longer a matter of simply securing the network perimeter. The cloud and remote workers now have to be part of the equation too.

In order to cope with this, more and more businesses are turning to the use of zero trust methodology. We spoke to James Carder, CSO of SIEM platform LogRhythm to find out more about why this is a technology whose time has come and how it can be implemented effectively.

Continue reading

Why AI isn't the only answer to cybersecurity [Q&A]

machine learning AI

Read about any new cybersecurity product today and the chances are that it will be keen to stress its use of AI in some form.

But are we expecting too much from AI and are companies adopting it just because it's on trend? We spoke to Nadav Arbel, co-founder and CEO of managed SOC platform CYREBRO, to find out more about AI's role and why the human factor is still important.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.