Articles about Q&A

Zero trust access, VPN, both? The changing face of remote network access [Q&A]

Networked computers

Virtual private network (VPN), software defined perimeter (SDP), zero trust network access (ZTNA), there are plenty of technologies around for protecting remote access to enterprise networks.

This is an area that's been thrown into sharper focus this year, but what's the best option for keeping remote access secure? We spoke to Scott Gordon, CISSP for Pulse Secure to discuss the value of the different options available.

Continue reading

How the banking sector is adapting to security and regulatory requirements [Q&A]

computer piggy bank and cash

Banks and other financial services institutions have been moving more and more towards digital in order to streamline processes and improve customer service.

The pandemic has accelerated this process but has also brought a rise in cyberattacks. Regulators have also begun to take more notice of security practices surrounding accounts. We spoke to Michael Magrath, director, global regulations and standards, at specialist in anti-fraud and digital identity solutions for financial institutions OneSpan, to discover more.

Continue reading

Is it time to rethink legacy firewalls? [Q&A]

Firewall

A new report from Guardicore and the Ponemon Institute reveals that more than 60 percent of organizations believe that legacy firewalls are ineffective in preventing damaging cyberattacks against applications, data centers, and data in the cloud.

We spoke to Dave Burton, VP marketing at Guardicore to find out more.

Continue reading

MACH and what it means for development [Q&A]

Launched in June of this year, the MACH Alliance (MACH standing for Microservices based, API-first, Cloud-native SaaS and Headless) is a non-profit group of tech leaders advocating for a new, open and best-of-breed enterprise technology ecosystem.

The Alliance aims to help enterprise organizations navigate the complex modern technology landscape with the belief that competitive advantage doesn't come from owning the stack, but rather from being free to select the best available resources for the moment.

Continue reading

Dealing with the security risks of unstructured data [Q&A]

Unstructured data

Businesses are increasingly reliant on data. In the past that's generally been in a structured form but, thanks to increasing amounts of customer information gleaned via the IoT and channels like social media, unstructured data has taken on a new importance.

Yet unstructured data also introduces new risks. AI-based solutions specialist Concentric is launching a new data access governance solution that addresses the challenge of unstructured data security. We spoke to Karthik Krishnan, CEO at Concentric, to find out more.

Continue reading

The rise of the shopping bot and what it means for security teams [Q&A]

If you've ever tried to order a recently released tech product, like a new game console or the latest hot graphics card only to find it's sold out, you've no doubt felt frustrated. It's even more frustrating when the product then appears on secondary market sites at many times the original price.

What you're seeing here is probably the action of automated shopping bots that scoop up products for resale at a profit. Is this a form of cyber attack or is it just rather shady commercial activity? We spoke to Ameya Talwalker, co-founder of Cequence Security, to find out more about the behavior of these bots and what can be done to curb their activity.

Continue reading

Getting real about ransomware [Q&A]

Ransomware sign

For every high-profile ransomware incident in the headlines, there are many more that never get reported. Particularly among small- and medium-sized businesses, often with small IT and cybersecurity teams, a ransomware attack can be an existential problem.

To understand how companies should respond when they discover they're in the grip of a ransomware threat actor, we spoke with Kurtis Minder, CEO and co-founder of GroupSense, which helps companies navigate through these attacks to get their businesses back online.

Continue reading

How AI can help enterprises stay on top of data governance [Q&A]

Data governance

Security breaches and privacy violations can cost businesses dearly. not only in financial penalties but also by causing damage to their reputation.

Keeping tabs on your data and how it's used is an essential part of staying in control and it's an area where AI can help. We spoke to Amar Kanagaraj, founder and CEO of AI-powered data protection and data governance specialist oneDPO to find out more.

Continue reading

How the pandemic has reinvigorated Emotet [Q&A]

Trojan horse

The US Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has recently put out a warning concerning a surge in activity from the group behind the Emotet trojan.

Emotet has been around for some time and has mostly been associated with banking trojans, but this year’s upsurge in activity has seen it branch out into other areas.

Continue reading

SASE will top the cybersecurity priority list in 2021 [Q&A]

DevSecOps

COVID-19 has caused many industries to experience an economic downturn, but cybersecurity isn't one of them.

Rather, cybersecurity is taking on newfound or heightened importance within many companies, as cybercriminals continue to exploit the global health crisis and associated business disruption to prey on unsuspecting work-from-home employees.

Continue reading

The evolution of cloud native -- Kubernetes and beyond [Q&A]

Cloud growth arrow

Enterprises are expanding their view of 'cloud native' to be much more than simply deploying containers on Kubernetes in the Cloud.

A new report -- Cloud Native Adoption Trends 2020-2021 -- from Lightbend, the company behind the Scala programming language, sheds light on this trend. We spoke with Mark Brewer, CEO of the company to learn more about how developers and business leaders alike are looking higher up the stack, at the application layer.

Continue reading

The challenge of effectively securing collaboration tools [Q&A]

remote work

The COVID-19 pandemic has forced many more organizations to adopt remote working. This in turn has led to a boom in the use of tools like Teams and Zoom to help employees communicate.

Securing those tools though presents some serious challenges ensuring that, for example, they aren't used, inadvertently or on purpose, to leak sensitive information.

Continue reading

Developer productivity in the remote era [Q&A]

Many more people are now working remotely and developers are no exception. But how does this shift in working patterns affect their productivity?

We spoke to Manish Gupta, CEO and founder of code analysis specialist ShiftLeft to find out more about the challenges of development in a remote world.

Continue reading

Vulnerabilities in eCommerce platforms make for holiday season risks [Q&A]

eCommerce

As we head towards a COVID Christmas it's likely that many more people will be doing their holiday shopping online.

But while this is good news for online retailers it's also an opportunity for fraudsters. This year has already seen a surge in attacks on eCommerce sites and there are certain to be more to come. We spoke to Satnam Narang, staff research engineer at Tenable to find out more about the latest vulnerabilities and how businesses can protect themselves.

Continue reading

How SASE is transforming enterprise network security [Q&A]

Networked computers

Securing enterprise networks used to be a matter of simply defending the perimeter, but in the new normal world of much higher levels of remote access, things have become more complicated.

One of the technologies being used increasingly by businesses is Secure Access Service Edge (SASE). We spoke to Mike Wood, chief marketing officer of Versa Networks, to discover more about SASE and what it can deliver.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.