Articles about Q&A

Applying a hybrid working model to your cloud strategy [Q&A]

Cloud

The shift brought about by the pandemic has accelerated many companies’ plans to move to the cloud. But all migrations come with some risk and rushing them through may be storing up problems for the future.

A successful hybrid strategy can help in avoiding these issues. We spoke to Arcserve's backup, DR, and ransomware protection evangelist Sam Roguine to find out about the potential risks of rushed cloud migrations -- like security gaps and missing data -- and how IT leaders can address them.

Continue reading

The growing risk from critical infrastructure cyberthreats [Q&A]

Industrial computer system

The more reliant businesses become on technology the more risk they face from a range of cyberthreats. This is especially true when it comes to critical infrastructure as it's an attractive target for nation state and other attackers.

We spoke to James Carder, chief security officer and vice president of labs at SIEM platform LogRhythm to discover more about critical infrastructure threats and how to guard against them.

Continue reading

How changes to tracking will affect the online world [Q&A]

The Identifier for Advertisers (IDFA) is a random device identifier assigned to a user's device which advertisers use to track data so they can deliver customized advertising.

But Apple is about to replace the iOS IDFA tracking system in iOS 14 with a new App Tracking Transparency (ATT) feature which will allow iPhone users to opt-out of tracking on third-party apps and sites. This, plus Google's crack down on third-party cookies, means privacy is a hot topic currently -- and all signs point to even more shifts in the coming year.

Continue reading

Why email is still the favorite way of delivering cyberattacks [Q&A]

Email attack

Although business IT has seen many changes over the last year, email remains the main vector for carrying out cyberattacks.

In its latest Global Security Report Zix looks at the trends in email attacks over the last year and the impact they have. We spoke to David Wagner, president and CEO of, Zix to find out more.

Continue reading

Overcoming SaaS platform tech debt [Q&A]

SaaS

The rapid shift to remote working has accelerated digital transformation and mass-cloud migration across almost every organization -- even those who weren't necessarily ready for it.

As IT professionals settle into long-term planning and management of their SaaS platforms and apps, CoreView's SVP Doug Hazelman believes they must now begin to effectively manage their cloud infrastructure so they can focus on maximizing the value of their investments. We spoke to him to learn more.

Continue reading

Why security and observability are key to software development [Q&A]

Developers are under increasing pressure to create real-time products that make the most of a wide range of digital resources.

This means that DevOps teams have to cope with information drawn from all sorts of different sources. But how can they ensure they are getting an accurate picture?

Continue reading

Why SASE is vital for the cybersecurity industry [Q&A]

Network security

One of the frameworks that has received greater attention since the acceleration of digital transformation is Secure Access Services Edge (SASE).

But what does its adoption mean for the security industry and how can enterprises best take advantage of SASE? We spoke to Mary Blackowiak, senior product marketing manager at AT&T Cybersecurity, to discover more.

Continue reading

How and why the telecoms industry is coming under sustained attack [Q&A]

Shocked man looking at phone

The trend towards digital transformation and the sudden shift to remote working has seen the telecommunications industry become a prime target for both criminal and state-sponsored attacks.

Threat intelligence specialist IntSights has produced a new report focusing on the threats to the telecoms industry and we spoke to Paul Prudhomme, cyber threat intelligence advisor at the company to find out more.

Continue reading

SaaS applications and what they mean for security management [Q&A]

SaaS

The move to using SaaS applications has been accelerated by the pandemic, with many businesses turning to the cloud to enable their staff to work remotely.

But this raises new issues around keeping the business secure. We spoke to Shailesh Athalye, vice president of compliance at security and compliance platform Qualys to discover more about the issues and how to approach them.

Continue reading

Why enterprises aren't properly addressing supply chain threats [Q&A]

supply chain

Supply chain threats like the recent SolarWinds attack are becoming more of a concern as businesses are more reliant on smoothly functioning links with suppliers and customers.

A successful attack can have a devastating effect on an organization and its reputation, but by their very nature these are not easy threats to deal with.

Continue reading

What's wrong with software debugging? [Q&A]

code

We've seen a tidal wave of developer-enabling technologies over the last ten years. From DevOps, to CI/CD, to containers and microservices -- all of these best practices and technology patterns aim to speed up the process of shipping code fast from the developer into production.

But while software has become increasingly easy to package and deploy, the process of diagnosing and fixing bugs in production has become much more difficult. When services crash in the middle of the night, developers still find themselves in the world of logs, hotfixes and desperation -- but now with much greater surface area to investigate as applications span distributed systems.

Continue reading

The challenges of navigating breach notification rules [Q&A]

Data breach

New and updated privacy legislation is being launched around the world and a key component of these acts is breach notification requirements, which mean a business is required to notify individuals when their information falls into the hands of an attacker.

We spoke to Ralph Nickl, founder and CEO of Canopy Software to find out what what enterprises and consumers need to know about these laws and the challenges that compliance brings.

Continue reading

Why financial enterprises need to take a more Agile approach [Q&A]

Agile development

Adopting a more agile approach to development has allowed many businesses to speed up the introduction of new products and services.

But banking and financial organizations have tended to be more conservative in their approach and have consequently come under pressure from faster moving fintech competitors.

Continue reading

How computer simulation is revolutionizing science and engineering [Q&A]

Digital twins

In 2020, companies like Tesla and Aerion (supersonic jets) flaunted 'Digital Twins' as being the cornerstones of their product design prowess.

This concept of representing physical objects in digital fashion is an extension of the general computer simulation industry that has been decades in the making. If 'software is eating the world', it seems that for the applied sciences type of domain, computer simulations have officially become the standard utensils.

Continue reading

A permanent beta mindset for 2021 [Q&A]

2020 turned the world on its head, and 2021 is proving to be just as challenging for many at the moment. The UK government, and those working to deliver the technology for it, not only have the current pandemic to worry about, but also fallout from Brexit.

Prahlad Koti, Partner at Netcompany explains why, as technologists, we must heed the lessons, look out for the speed bumps ahead and build technology that will bring sustainable good to the public sector.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.