Articles about Q&A

Why the human factor is key to cybersecurity [Q&A]

endpoint security

There are many things to consider when it comes to making systems secure, but one thing that is often overlooked is the human angle.

George Finney, CISO, CEO and founder of Well Aware Security believes that cybersecurity is a people problem first and foremost -- people are the ones who write and employ processes and people are the ones who create and use technology. No surprise then that people are behind some 95 percent of cybersecurity incidents.

Continue reading

The normalization of data leaks and the privacy paradox [Q&A]

privacy key

Is society becoming too accepting of data breaches? Do we claim to want more privacy but then continue to treat our own data in a cavalier fashion?

A recently leaked internal memo from Facebook revealed the company's plans to normalize data scraping leaks and change the way the public views these incidents.

Continue reading

How an open charging network could boost EV adoption [Q&A]

Electric car charging

Although there has been a surge of interest in electric vehicles brought about by governments legislating to phase out internal combustion power, many people are put off by the difficulties of charging, made more of a challenge by the number of different networks each needing its own app, card or token.

A new company EVPassport wants to build an open charging network, allowing EV drivers to use an API-based system integrated into an app like Google Maps, or simply scan a QR code on the charger. We spoke to its CEO and co-founder, Aaron Fisher to find out more.

Continue reading

Why the CI/CD pipeline is vulnerable to attack [Q&A]

open digital lock

Recent high-profile supply chain attacks such as SolarWinds have highlighted how vulnerable the software development pipeline can be.

To find out more about why the CI/CD pipeline is particularly vulnerable to attacks and what can be done to prevent them, we spoke to Vickie Li, developer evangelist at ShiftLeft, which has just launched a new product, ShiftLeft CORE, aimed at reducing risk to the software code base.

Continue reading

Why Istio is winning the open source service mesh race [Q&A]

In recent years the use of microservices has helped to streamline development processes. But there's still an issue with managing communication between services.

Service mesh is a technology that adds uniform networking capabilities right across the program stack but is decoupled from the application code itself.

Continue reading

How government agencies are adapting to remote working [Q&A]

working from home

The last year has seen all businesses facing a major shift as employees have been forced to work from home.

Government agencies have been no exception to this, but they have specific issues relating to handling sensitive data. Last month the US Department of Agriculture (USDA) announced a plan to expand remote work options and other agencies are expected to follow suit.

Continue reading

How cybercriminals are targeting healthcare organizations [Q&A]

Researchers at digital risk protection company CybelAngel recently tracked bad actors targeting French hospitals by analyzing conversations on the dark web.

It discovered how cybercriminals plan healthcare-related fraud, ransomware and other attacks by obtaining stolen credentials, leaked database files and other materials from specialized sources in the cybercrime underground.

Continue reading

Why Zero Trust is key to data protection [Q&A]

Padlock on network cables

Since the idea of Zero Trust was first proposed back in 2010 it's sparked interest from organizations of all sizes.

But why is Zero Trust seen as a game changer when it comes to protecting organizations and data? We spoke to Jason Clark, chief security and strategy officer at Netskope to find out.

Continue reading

Adapting enterprise IT to the new normal [Q&A]

remote working, telecommuting

The past year has created an unprecedented shift, with businesses scrabbling to implement technologies to allow large numbers of staff to work remotely.

It seems likely that as we emerge from the pandemic a large proportion of this shift will become permanent. So, what can companies do to adapt their IT to this 'new normal' and ensure access to essential systems while maintaining security and compliance standards?

Continue reading

How improving security management can help protect the cloud [Q&A]

Private secure cloud

Cloud misconfigurations are one of the major causes of data breaches and the problem has become worse thanks to the dash for remote working.

While cloud is undoubtedly the right choice for businesses looking to expand their infrastructure to keep pace with DevOps demands and embrace support for remote working, many enterprises are falling short of providing adequate Cloud Security Posture Management (CSPM).

Continue reading

Tackling the social engineering bonanza caused by the Microsoft Exchange hack [Q&A]

Social Engineering

In early March, Microsoft disclosed that Chinese hackers had exploited software vulnerabilities in Microsoft Exchange on-premises servers to gain access to the email accounts of thousands of Microsoft customers.

While these companies are now laser-focused on deploying patches and other security measures to remediate the vulnerabilities in their email software, Josh Douglas, VP of product management -- threat intelligence at Mimecast, believes these technical fixes will only go so far.

Continue reading

The future of enterprise search technology [Q&A]

magnifier

Businesses are gathering more data than ever before, but being able to make effective use of it means being able to find information when you need it.

What challenges does dealing with these ever larger amounts of data present? And how can you be certain that your searches are delivering relevant information and insights to drive your business decisions? We spoke to Stéphane Kirchacker, VP EMEA at search specialist Sinequa to find out.

Continue reading

How PostgreSQL has popularized open source enterprise databases [Q&A]

open source

Although open source has gained in popularity in recent years, in some circles it's still viewed as being inaccessible to all but tech experts.

But that's starting to change, the PostgreSQL database has earned a strong reputation among businesses for reliability, feature robustness, and performance and has contributed to the growth in open source.

Continue reading

How automation can help people do their jobs [Q&A]

Automation

The past year has seen many changes to the way businesses operate, including a stepping up of digital transformation and more interest in automating processes.

But many people still fear that greater automation could lead to a loss of jobs. We spoke to Yakaira (Kai) Nunez, senior director of research and insights at Salesforce to discover why she thinks enterprises can deploy automation to partner with rather than replace humans.

Continue reading

Securing insurance's new attack surface with crowdsourced cybersecurity [Q&A]

business security

All industries have been affected by the COVID-19 pandemic and the need to shift to new ways of working. This change has also led to an expanded attack surface for cyber criminals.

The insurance sector has been particularly hit in the past year and we spoke to Ashish Gupta, CEO of crowdsourced security company Bugcrowd to find out how businesses have been affected and how they're responding to the challenge.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.