Why the IoT presents major data challenges [Q&A]


Internet of Things (IoT) devices are generating huge volumes of data and that represents a challenge for organizations when it comes to processing and storing it.
We spoke to Karthik Ranganathan, CTO of the company behind the distributed SQL database YugabyteDB, to find out how businesses can cope with the complexity and performance issues that handling IoT data and its associated metadata raises.
Departing employees and the risk to corporate data [Q&A]


New research into insider threats from security automation platform Securonix shows that 60 percent of data exfiltration incidents are carried out by employees identified as 'flight risk', in other words that are about to leave the business.
We spoke to Shareth Ben, director of insider threat and cyber threat analytics with Securonix, to find out more about insider threats, flight risks and how companies can protect themselves.
Why corporate communication tools are the new threat vector [Q&A]


In the new normal world where more work is being carried out remotely, corporate communications have increased in importance but they have also come under greater threat.
As the recent Twitter attack shows, communication tools offer hackers an attractive extra method of getting hold of sensitive information like login details.
Why security needs to focus on the user not the location [Q&A]


Keeping enterprise systems secure used to be a relatively simple matter of defending the network perimeter. But in recent times the increased sophistication of attacks, a shift to more remote working, and demands for more sophisticated identity management mean things are much more complex.
We spoke to Greg Keller, CTO of directory-as-a-service company JumpCloud who believes that the answer is to move the security perimeter to the user, wherever they are located.
Remote work and organizational silos [Q&A]


The move to remote working, driven by the coronavirus pandemic, has highlighted a number of issues, not least the ability of all parts of an enterprise to collaborate.
Unless there's a means for departmental processes to work together, organizations will soon find themselves in a very siloed workplace. We spoke to Terry Simpson, technical evangelist at process automation company Nintex, to discuss how organizations can break down silos and increase collaboration across their teams even when working remotely.
Unlocking the potential of security operations [Q&A]


The use of security operations centers has become commonplace in larger organizations. But how can businesses unlock their full potential to protect their systems?
We spoke to Matt Walmsley, head of EMEA marketing at network detection and response specialist Vectra AI, to find out.
How a software company has innovated its way out of lockdown [Q&A]


Lockdowns have presented a challenge for all businesses and it's clear that some have handled the situation better than others.
We sat down with Neil Everatt, CEO of Selenity to discuss how the business has been coping during lockdown and what changes to productivity and innovation he’s seen.
The future of endpoint management [Q&A]


It's frequently the case that the weakest part of any business network is the endpoints used to access it. A problem that's only been exaggerated by the shift to remote working driven by the coronavirus pandemic.
What can businesses do to improve their endpoint management and keep their data secure? We spoke to senior technical product manager Richard Melick at cloud-based device management specialist Automox to find out.
Why Generation Z are the fully digital pioneers [Q&A]


The Center for Generational Kinetics and WordPress platform WP Engine recently released a study looking at the digital habits of Europeans born between 1996-2015.
It shows that Generation Z has become the most internet-dependent generation, but what does this mean both for the Gen Zers themselves and the wider digital community? We spoke to Fabio Torlini, EMEA MD at WP Engine to find out.
How cybercrime impacts the charity sector [Q&A]


Charities handle billions in funds every year and hold financial and personal information that cybercriminals increasingly see as a tempting target. Yet, according to the UK's Charity Commission only 58 percent of charities think they are at risk from cybercrime.
But for a sector, whose success is built on its reputation and the goodwill of its supporters, the loss of any sensitive information or fraud through phishing attempts can be devastating.
The role of SASE in securing the modern workforce [Q&A]


Digital transformation combined with a shift to more remote working has presented considerable challenges for enterprises when it comes to securing their systems.
One of the technologies being increasingly used to enable remote access is Secure Access Services Edge (SASE). We spoke to Anurag Kahol, CTO and co-founder of cloud security company Bitglass to find out more about SASE and how it can help businesses deliver their transformation projects.
How traffic analysis can help protect business networks [Q&A]


One of the biggest challenges that cybersecurity teams face at the moment is alert noise which can blind them to real threats.
Corporate performance management (CPM) specialist Prophix Software recently chose to adopt a network traffic analysis (NTA) solution to address this issue. We spoke to Kristofer Laxdal, the company's director of information security to discover why it chose invest in NTA technology and what benefits it's seeing.
How e-signatures are changing the commercial world [Q&A]


The idea of electronic signatures has been around for a while, but their importance has been highlighted by recent changes brought about by the COVID-19 pandemic, meaning signing documents in person may be difficult.
We spoke to Sameer Hajarnis, practice lead for e-signature at digital fraud prevention specialist OneSpan to find out more about adopting e-signatures in the current business landscape, what businesses need to look for and how these technologies can securely enable efficiencies, improve processes, ensure legal compliance and deliver an improved customer experience.
Why DevOps teams need to take container security seriously [Q&A]


Earlier this year hackers were able to exploit container platform Kubernetes to install cryptomining software in Microsoft Azure.
Fei Huang, chief strategy officer at container security platform NeuVector believes that this should be a wake up call to get the attention of enterprise DevOps and DevSecOps teams. We spoke to him to find out more about the risks and how they can be addressed.
How digital transformation is changing the oil and gas industry [Q&A]


Businesses across all sectors are looking to review their processes and launch digital transformation projects. But long-established industries like oil and gas, while innovative in some areas often lag behind with their back office systems.
We spoke to Leon Busch, COO of specialist in this sector WolfePak Software to find out how companies in this field are using transformation and what it's doing for their businesses.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.