Articles about Q&A

Why critical infrastructure businesses shouldn't wait for a cyber crisis to push for cultural change [Q&A]

Industrial computer system

Cybersecurity is important to any enterprise, but it's especially key to those that are delivering critical infrastructure.

But recent research from Nozomi Networks shows that often the development of a holistic security approach is being driven by events such as security breaches.

Continue reading

The challenges of securing a remote workforce [Q&A]

Remote working

The current coronavirus crisis has led to a massive surge in numbers of people working from home. But that raises a whole raft of problems in keeping people and data secure.

We spoke to Nitin Agale, SVP, product and strategy at security automation specialist Securonix, to find out more about the challenges and how organizations can address them.

Continue reading

Why supply chain security is essential to digital transformation [Q&A]

supply chain

As digital transformation projects mean enterprises are sharing more and more information with customers and suppliers, added focus is placed on the security of that data.

To find out how companies can address this, while still reaping the benefits of AI, IoT and other fast growing technologies, we spoke to Fouad Khalil, VP of compliance at SecurityScorecard.

Continue reading

Why security professionals need to engage with developers [Q&A]

DevSecOps

Building security into an application can often be an afterthought for developers, yet building those steps in at an early stage can save companies time and money.

We spoke with Matt Glenn, vice president of product management at Illumio, who shared his insights on why security professionals should be engaging with developers, and why segmentation is becoming a go-to tool for developers to easily implement security into their processes.

Continue reading

How new performance trends in JavaScript are driving an ever-faster web [Q&A]

JavaScript

'Write once, run anywhere' was the promise that Sun Microsystems made for Java in the mid '90s. But front-end development trends suggest that it's really JavaScript -- and its fast-evolving libraries and frameworks -- that are executing on that promise today.

To learn more about the JavaScript trends that are delivering an ever-faster, device and browser-agnostic web experience to users, we spoke with Guillermo Rauch, co-creator of the popular Next.js web framework.

Continue reading

What impact will a Data Protection Act have in the US? [Q&A]

data protection jigsaw

The US Congress is currently considering whether to pass a bill to create a Data Protection Act which would set up a federal data protection agency.

The bill, introduced last month, spells out how the agency would enforce data protection and privacy rights, putting Americans in control of their own data. But what exactly does that mean? And how would a bill with the sole goal of protecting individuals’ data effect the tech, financial and healthcare industries?

Continue reading

How telemedicine technology can help cut the threat of coronavirus [Q&A]

telemedicine

As nations around the world gear up to deal with the coronavirus, what role can technology play in preventing the spread of this and other infectious diseases?

We spoke to Dr Jonathan Wiesen, founder and chief medical officer of telemedicine company MediOrbis to find out.

Continue reading

How gamification is helping the insurance industry boost sales [Q&A]

Life insurance

New research conducted by The Harris Poll on behalf of SE2 and Life.io finds the vast majority of respondents would opt to share real-time wellness data with insurance companies through wearable devices in exchange for ongoing benefits like a lower insurance premium or wellness rewards.

​The data, based on results from more than 2,000 adults, also finds that people want their policies to be more interactive. Roughly two thirds (68 percent) say if a provider offered a policy that included elements of gamification to reward healthy lifestyle and wellness habits -- like badges for hitting certain milestones, a leaderboard, financial rewards -- they would be likely to engage in those elements.

Continue reading

What happens when your identity is stolen on social media? [Q&A]

identity theft mask

Scams involving social media and online dating sites are on the increase. So it's not surprising that recent research shows a majority of people are now worried about identity theft and account hijacking.

But what happens when your identity gets stolen? And what can you do to protect yourself from this kind of scam?

Continue reading

5G and risks to critical infrastructure [Q&A]

industrial skyline

The speed and bandwidth of 5G means that as the roll out continues a lot of industrial automation equipment will eventually be on the 5G network.

So what can be done to protect the integrity and availability of manufacturing networks and other critical infrastructure? We spoke to Dave Weinstein, CSO of Claroty to discuss the link between 5G and the cyber security of critical infrastructure.

Continue reading

The risks of outdated systems in IoT and industrial environments [Q&A]

Industrial IoT

With Windows 7 now at its end-of-life, the need to update outdated systems is of the utmost importance. This is especially true for Internet of Things (IoT) and Industrial Control System (ICS) environments, as vulnerabilities in these older systems can lead to attacks that result in costly downtime, catastrophic safety and environmental incidents, and theft of sensitive intellectual property.

We spoke to Phil Neray, vice president of industrial cybersecurity at CyberX, to find out more about why updating these systems is so imperative and to hear some recommendations about how organizations can go about doing so.

Continue reading

The challenges of compliance in an as-a-service world

SaaS

Software-as-a-service (SaaS) is rapidly replacing applications that were once hosted on-premises. There are compelling reasons for switching to SaaS. Costs are lower, there’s no in-house equipment or software to deal with, and no updates or patches to manage. Organizations are obviously aware of the advantages. Experts at Gartner estimate that SaaS global revenue will exceed $94 billion in 2019, up 18.5 percent over 2018. The outlook for future growth is even more promising, with projections that revenue will soar to $143.7 billion by 2022.

But the as-a-service model raises a critical issue facing organizations: compliance with GDPR, HIPAA, the California Consumer Privacy Act (CCPA), Sarbanes-Oxley and other regulatory schemas that govern company data. Who owns the data and is responsible for compliance? What should customers expect from SaaS vendors?

Continue reading

Cyber insurance and its place in business security strategy [Q&A]

insurance key

Data breaches and cyberattacks can be costly for businesses, not just in financial terms but also in damage to reputation.

It's not surprising then that more and more companies are looking to offset these costs by taking out cyber insurance policies, We spoke to Chris Kennedy, CISO and VP of customer success at AttackIQ to find out more about cyber insurance and the potential pitfalls.

Continue reading

How quantum computing will change analytics [Q&A]

quantum computing

Google announced in October that after years of theorizing, it had finally achieved the milestone of quantum supremacy -- carrying out a calculation in just three minutes that would take up to 100,000 years for a conventional computer.

Ask any analytics expert what they're excited to see in the future, and you’re likely going to hear quantum computing. That's largely due to the sweeping ways it will transform analytics. We spoke with Prasad Kothari, vice president of analytics and client solutions at The Smart Cube, about what that looks like.

Continue reading

What impact will the Cybersecurity State Coordinator Act have? [Q&A]

US capitol building

The US is currently considering new legislation that would require each state to appoint a cybersecurity leader.

The proposed Cybersecurity State Coordinator Act has cross-party support and would, say its backers, improve intelligence sharing between state and federal governments and speed up incident response times in the event of a cyberattack.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.