Adopting best practice approaches for hybrid working [Q&A]


More and more businesses are moving to a hybrid work model. But while this approach can offer improved value along with the tools to drive the business forward, it can also present a number of challenges.
So what does it take to succeed with a hybrid approach? We spoke to Cisco Webex's Lorrissa Horton to find out.
Digital forensics in modern cloud environments [Q&A]


Increasingly applications and infrastructure are moving to the cloud and containers. But although this offers convenience and cost savings it introduces challenges when security incidents occur.
We spoke to James Campbell, CEO and co-founder of Cado Security to find out about the importance of digital forensics when dealing with cloud system breaches.
How technical debt is harming API security [Q&A]


APIs allow the easy exchange of information between apps, microservices and containers. They've become an essential part of the way our digital infrastructure operates.
But the very ubiquity of APIs means developers are under pressure to produce them quickly and that can lead to 'technical debt' because corners are cut. We spoke to Tom Hudson, security research tech lead at app vulnerability scanner Detectify to find out more about why APIs are vulnerable in this way and how they can be secured.
Why supply chain security blind spots put enterprises at risk [Q&A]


Many recent cyberattacks have focused on the software supply chain, with SolarWinds being perhaps the most high profile example.
Businesses can often have a blind spot when it comes to the supply chain and this can have catastrophic consequences. We spoke to Todd Carroll, CISO of CybelAngel to learn more about the problem and what companies can do to keep themselves safe.
Protecting Kubernetes from ransomware [Q&A]


Many organizations have been quick to adopt containerization and particularly Kubernetes. But while there are advantages in scale and flexibility, it also raises issues around cloud-native data protection practices.
So how can businesses adopt the technology but still protect their information? We spoke to Gaurav Rishi, VP product, at Kubernetes backup specialist Kasten by Veeam to find out.
How 'bending reality' can deliver business success [Q&A]


What makes tech pioneers successful? What’s the key to becoming a business billionaire? Leadership adviser Victoria Song thinks it's because they have the ability to 'bend reality' to what they want it to be.
What's more she believes that with a simple meta-framework that underlies peak performance, self-development, and meditation anybody can become a success in the same way.
With the rise of zero trust, is the VPN really dead? [Q&A]


As a big chunk of the world suddenly started to work from home during the pandemic, many companies turned to VPNs as a means of securing remote access.
However, as more systems are now in the cloud and secured using zero trust network access (ZTNA) is the age of the VPN over? We spoke to Robert Byrne, field strategist at One Identity to find out.
Ensuring compliance takes a front seat when using collaboration tools [Q&A]


One effect of the pandemic shift to working from home has been a surge in the use of collaboration platforms. Microsoft Teams alone just exceeded 250 million monthly active users.
But a new whitepaper from Theta Lake and Osterman Research, Archiving And Data Protection With Microsoft Teams, brings to light the strengths and weaknesses of native archiving and data protection in Microsoft Teams and why firms look to third-party solutions to address coverage gaps.
Data governance -- balancing security against risk [Q&A]

Why threat intelligence is key to the future of cybersecurity [Q&A]


As threats continue to evolve security vendors must keep up. This means having up to date information and being able to act on it quickly.
The key to this is effective threat intelligence. We spoke to Anuj Goel, co-founder and CEO of Cyware to find out more about threat intelligence and why sharing is key to making the most of it.
Why unintentional insider data leaks are still a problem for businesses [Q&A]


Whilst threats to data are often seen as being down to external actors, it's often the case that leaks, both intentional and otherwise, can come from insiders.
Unintentional or accidental leaks remain a major problem, and one that’s been made worse thanks to more home working. We spoke to Rajan Koo, SVP, engineering and cyber intelligence at DTEX Systems to learn more about this type of threat and how businesses can address it.
The challenges of securing Active Directory [Q&A]


As we saw in the recent SolarWinds attack, Active Directory can be exploited as a means of attacking corporate networks.
But why is AD such an attractive target? And why are companies struggling to secure it even though it's hardly a new technology? We spoke to Carolyn Crandall, chief security advocate at AttivoNetworks to find out.
The underground marketplaces behind cybercrime [Q&A]


In the last few decades, we've seen cybercrime transform from an activity perpetrated by independent lone actors into an increasingly professional business endeavor in pursuit of profit.
Cybercriminals communicate and collaborate, working together and exchanging information on the deep and dark web. But what exactly is up for sale on these underground markets and what does this tell us about threat actor behavior and motivation?
How security teams can build a strong IT partnership for zero trust implementation [Q&A]


As the enterprise IT landscape has become more complex, security is no longer a matter of simply securing the network perimeter. The cloud and remote workers now have to be part of the equation too.
In order to cope with this, more and more businesses are turning to the use of zero trust methodology. We spoke to James Carder, CSO of SIEM platform LogRhythm to find out more about why this is a technology whose time has come and how it can be implemented effectively.
Why AI isn't the only answer to cybersecurity [Q&A]


Read about any new cybersecurity product today and the chances are that it will be keen to stress its use of AI in some form.
But are we expecting too much from AI and are companies adopting it just because it's on trend? We spoke to Nadav Arbel, co-founder and CEO of managed SOC platform CYREBRO, to find out more about AI's role and why the human factor is still important.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.