Articles about Q&A

Why the financial sector is especially vulnerable to cyberattacks [Q&A]

Piggy bank theft

There's a famous quote attributed to career criminal William Francis Sutton Jr., when asked why he robbed banks he is said to have replied, "Because that's where the money is."

For today's cybercriminals the motivation to make money is much the same, so the banking and financial services sector is a prime target. We spoke to Paul Prudhomme, cyber threat intelligence advisor at IntSights to find out more about the threats the industry faces and how they can be addressed.

Continue reading

Why testing is vital to securing modern enterprises [Q&A]

penetration testing

Security testing has gained in visibility in recent years and can undoubtedly help improve the security posture of a business.

But cybercriminals frequently shift tactics and develop new ideas, so testers can’t afford to stand still and must keep up with and anticipate trends.

Continue reading

The state of SOCs in a post-COVID world [Q&A]

DevSecOps

The past year and the rapid changes it has brought have placed a good deal of pressure on security analysts and made their work vitally important.

A new report from Respond Software and the Ponemon Institute takes a look at the state of security operations centers (SOCs) and how they're coping.

Continue reading

Why Salesforce is no Microsoft competitor [Q&A]

Late last year Salesforce acquired Slack for $27.7 billion, a deal that has caused major waves within the enterprise software market as pundits try to forecast how the chat app fits under the Salesforce umbrella and whether this is an attempt to challenge Microsoft for the enterprise.

We spoke with CoreView CEO Shawn Lankton, whose company is not only a Microsoft Gold partner but whose SaaS management platform supports enterprises that operate cloud and hybrid environments. He gave us his thoughts on Salesforce's motivation behind the sale and how it will shape the enterprise software world.

Continue reading

How secure SD-WAN can improve security and cut costs [Q&A]

remote working

Securing enterprise networks has always been a challenge, but 2020 and the shift to remote working has made it even more so.

Fortunately secure SD-WAN technology can help businesses to deal with the new landscape as well as reducing costs and making strong security accessible to more organizations. We spoke to Mike Wood CMO of Versa Networks to find out more.

Continue reading

How the MITRE Shield can help organizations better address their adversaries [Q&A]

Malware shield

The MITRE ATT&CK framework is now used by many organizations to help them understand and counter threats. Less well known is the latest addition, MITRE Shield.

We spoke to Carolyn Crandall, chief deception officer and CMO at Attivo Networks to find out more about how this can be used along with MITRE ATT&CK to better address adversaries.

Continue reading

Enabling zero trust for small and medium enterprises [Q&A]

Data cloud lock

The move towards zero trust has been one of the big security stories of 2020, driven by a switch to remote work, but so far it has been largely the preserve of bigger organizations.

Now though JumpCloud has added Conditional Access policies to its Directory Platform, enabling IT admins to adopt zero trust security from the same cloud platform that they use to manage and securely connect users to IT resources.

Continue reading

Open source vs open core -- the development battle you may never have heard of [Q&A]

There's a battle playing out in the enterprise open source arena right now, but it's one you probably haven't heard about.

It's a clash between pure open source and commercialized open source (or 'open core') versions. While this may be below the radar for anyone not directly involved it has important long-term implications for the industry.

Continue reading

Combating the rising costs of the cloud [Q&A]

Many businesses have moved their operations to the cloud in recent years, spending an estimated $96.4 billion on cloud infrastructure services last year.

The pandemic has accelerated this shift and has led many enterprises to take a hard look the rising costs of the cloud and consider how they can get the most from their investment.

Continue reading

How security operations centers can beat 'alert overload' and reach maturity  [Q&A]

Business security

Security operations centers are on the front-line of any organization's battle to protect itself from threats. But many of the teams in these vital facilities are working without the time, staff and resources they need to operate at peak capacity. One of the major problems facing SOCs is 'alert overload', a phrase which describes the difficulty in dealing with the avalanche of alerts generated every day of the week.

To find out how SOCs can beat this problem and achieve operational maturity, we spoke to Faiz Shuja, co-founder and CEO atrisk-based security specialist  SIRP.

Continue reading

The IT infrastructure needed for smart cities [Q&A]

smart city

Smart cities hold out the promise of a future where tech-driven urban spaces provide faster, smarter, greener living. But for this to work requires a high-performance digital infrastructure, not just fast internet.

Smart cities need to be built with a connected infrastructure and with future proofing in mind. To find out about the data center strategies required to make this work we spoke to Bill Fenick, VP of enterprise at interconnection specialist Interxion.

Continue reading

Zero trust access, VPN, both? The changing face of remote network access [Q&A]

Networked computers

Virtual private network (VPN), software defined perimeter (SDP), zero trust network access (ZTNA), there are plenty of technologies around for protecting remote access to enterprise networks.

This is an area that's been thrown into sharper focus this year, but what's the best option for keeping remote access secure? We spoke to Scott Gordon, CISSP for Pulse Secure to discuss the value of the different options available.

Continue reading

How the banking sector is adapting to security and regulatory requirements [Q&A]

computer piggy bank and cash

Banks and other financial services institutions have been moving more and more towards digital in order to streamline processes and improve customer service.

The pandemic has accelerated this process but has also brought a rise in cyberattacks. Regulators have also begun to take more notice of security practices surrounding accounts. We spoke to Michael Magrath, director, global regulations and standards, at specialist in anti-fraud and digital identity solutions for financial institutions OneSpan, to discover more.

Continue reading

Is it time to rethink legacy firewalls? [Q&A]

Firewall

A new report from Guardicore and the Ponemon Institute reveals that more than 60 percent of organizations believe that legacy firewalls are ineffective in preventing damaging cyberattacks against applications, data centers, and data in the cloud.

We spoke to Dave Burton, VP marketing at Guardicore to find out more.

Continue reading

MACH and what it means for development [Q&A]

Launched in June of this year, the MACH Alliance (MACH standing for Microservices based, API-first, Cloud-native SaaS and Headless) is a non-profit group of tech leaders advocating for a new, open and best-of-breed enterprise technology ecosystem.

The Alliance aims to help enterprise organizations navigate the complex modern technology landscape with the belief that competitive advantage doesn't come from owning the stack, but rather from being free to select the best available resources for the moment.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.