Articles about Q&A

How SASE is transforming enterprise network security [Q&A]

Networked computers

Securing enterprise networks used to be a matter of simply defending the perimeter, but in the new normal world of much higher levels of remote access, things have become more complicated.

One of the technologies being used increasingly by businesses is Secure Access Service Edge (SASE). We spoke to Mike Wood, chief marketing officer of Versa Networks, to discover more about SASE and what it can deliver.

Continue reading

Why businesses need to maintain GDPR compliance during remote working [Q&A]

GDPR logo

The General Data Protection Regulation (GDPR) came into force in the EU in May 2018 with the aim of giving individuals greater protection over how businesses use their data.

But the COVID-19 pandemic has thrown up new challenges and remaining compliant with the regulations in an age of remote working is one of them. We spoke to Brendan Kiely, managing director and co-founder of secure remote working specialist ThinScale Technology to discuss the implications of GDPR and the 'new normal'.

Continue reading

Delivering stronger security for enterprise data [Q&A]

Data security watch face

Data is among an enterprise's most valuable assets, no matter where or how it's stored, having visibility and unified access control is essential.

Mohit Tiwari, CEO at Data Store and Object Security (DSOS) company Symmetry Systems, left a professorship at the University of Texas in Austin to start the business and develop a new approach to data security in the form of Symmetry DataGuard which maintains authority over data even when all else fails. We spoke to him to find out more.

Continue reading

How AI transcription is helping business and education through the pandemic [Q&A]

AI speech bubble

The COVID-19 pandemic has seen large numbers of people adapting to new working patterns and ways of interacting.

AI-based transcription platform Otter.ai has seen a fivefold increase in demand in recent months and has transcribed 750 million minutes from over 25 million meetings. We spoke to Otter's founder Sam Liang to find out more about how it's helping to shape the future of work and education.

Continue reading

The importance of employee experience in a remote world [Q&A]

remote working, telecommuting

Digital transformation initiatives often focus on the customer experience. But in a world where remote working has become increasingly commonplace, employee experience is under the spotlight more than ever.

We spoke to Bill Hewitt, president and CEO of digital experience specialist Aternity, to find out more about the importance of making systems work for employees and how businesses can ensure that they do.

Continue reading

The challenges of hybrid cloud adoption [Q&A]

cloud data cable

Cloud is used for all kinds data processing nowadays, but there are still some things that need to be kept in-house, either for performance, compliance or other reasons.

This has given rise to the hybrid model, offering a mix of cloud and on-premise solutions, becoming increasingly popular. We spoke to Derek Taylor, lead principal security consultant at Trustwave, to find out more about the security and supply chain challenges that hybrid adoption presents.

Continue reading

Moving business securely to the cloud [Q&A]

Cloud data security

A large majority of enterprises are now using the cloud, but moving to cloud-based solutions inevitably presents challenges, not least in security.

We spoke to Sam Humphries, Security Strategist at SIEM (Security Information and Event Management) specialist Exabeam to get her views.

Continue reading

How BEC attacks have adapted to the pandemic [Q&A]

Email fraud

Business Email Compromise (BEC) attacks are increasingly used by attackers as a way of targeting organizations. New research from Abnormal Security  indicates that these attacks have adapted to the pandemic, with Zoom becoming the most impersonated brand and COVID-themed attacks surging.

We spoke to Evan Reiser, CEO of Abnormal Security to find out more about what’s been happening and what trends we can expect to see as the year progresses.

Continue reading

Securing privileged access can reduce the risk of data breach [Q&A]

Admin login

Accounts that have privileged access are a problem when it comes to data breaches, so securing them effectively is essential.

But things are complicated by the fact that where privileged access was once designated only for system administrators it has now been expanded to HR, finance, legal and many more parts of the organization, as well as to non-human users like machines and applications.

Continue reading

How extra demand for cashless payment services is changing the banking world [Q&A]

mobile payment

One of the side effects of the COVID-19 pandemic has been a marked reduction in the use of cash as people have shifted to using cashless and contactless payment methods.

This has put increased pressure on financial institutions to offer digital services, but it’s also shone a spotlight on the measures needed to prevent fraud and on initiatives to integrate cryptocurrency into everyday transactions.

Continue reading

How COVID-19 could be the trigger for lasting innovation [Q&A]

digital transformation

For many enterprise organizations the COVID-19 pandemic is a crisis to be managed. But could it actually be a catalyst to deliver a lasting legacy of technical innovation?

James Harvey, EMEA CTO at Cisco AppDynamics thinks it can be. We spoke to him to find out more.

Continue reading

Why vishing is the new phishing and how to guard against it [Q&A]

vishing smishing

We're all familiar with the menace of phishing but, particularly following the recent Twitter attack, other methods of stealing credentials have been on the rise.

These include 'smishing' (phishing via SMS) and 'vishing' (phishing by voice call). We spoke to Ed Bishop, CTO at email security company Tessian to find out how businesses can identify vishing and smishing attacks, how the attacks work, and how companies can protect their employees.

Continue reading

Why more organizations are choosing crowdsourced security testing [Q&A]

Software testing

During the pandemic, video conferencing app Zoom found itself at the center of several security and privacy issues. In response it has boosted its security program, including aggregating reports from Bugcrowd.

But what's driving organizations like Zoom choose crowdsourced security approaches? We spoke to Ashish Gupta, CEO of Bugcrowd to find out.

Continue reading

Why log management is essential to successful implementation of DevSecOps [Q&A]

Developer

DevSecOps, the integration of security into DevOps processes, is in increasingly common use. Logging and log management play a critical role in helping to put DevSecOps principles into practice by ensuring that developers, IT operations staff, and security teams have the visibility and communication pipelines they need to prioritize security at all stages of the DevOps delivery cycle.

We spoke to Ryan Staatz, systems architect and head of DevOps at LogDNA to discuss how log management fits in the toolchain of technology and practices that create a successful DevSecOps initiative.

Continue reading

How financial services companies are using technology to fight the fraudsters [Q&A]

Fraud

Account takeover attacks and online fraud of all types have skyrocketed during the pandemic as consumers have shifted almost all of their most important transactions to digital channels.

We spoke to David Vergara, senior director of security product marketing anti-fraud and digital identity solutions company OneSpan, to discover more about the emerging technologies that banks are beginning to use in the fight against fraud, including artificial intelligence, real-time risk analytics and behavioral biometrics.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.