How enterprises can maximize the value of automation [Q&A]


The idea of automating processes has of course been around since the industrial revolution. But even though we've moved on from the Spinning Jenny to artificial intelligence, automation has lost none of its importance.
So how can enterprises ensure that get the most from their automation in today’s complex world? Devin Gharibian-Saki, SVP of strategic automation at Redwood Software, believes that part of the key is to have an automation fabric. We talked to him to learn more.
The challenge of encrypted traffic for network defenders [Q&A]


When it comes to protecting sensitive information like financial data, personal information, and intellectual property, encryption has become a must. By scrambling data through the use of algorithms, only those with access to decryption keys are able to read what's being secured.
Encrypted traffic has fulfilled its intended mission: to lock down data. But, could it simultaneously be helping bad actors slip by undetected? And could encrypted traffic actually make it harder for network defenders to spot threats before it's too late?
Mitigating third-party risk in today's cyber ecosystem [Q&A]


As third-party risk continues to be a critical concern for enterprises, the need for effective risk management strategies has never been more pressing.
We spoke with Bob Maley, CISO of third-party risk management specialist Black Kite, to get his insights into effective strategies for managing this challenge along with the nuanced risks and necessary tactics to secure enterprise environments against sophisticated threats.
AI degradation -- what is it and how do we address it? [Q&A]


Many in the industry believe that AI is degrading because it's being starved of human-generated data. This leads to models being trained on the output of older models which increases the risk of hallucinations and errors.
But how big an issue is this and what can we do to fix it? We spoke to Persona CEO and co-founder, Rick Song to find out.
Why businesses need to start transitioning to post-quantum cryptography now [Q&A]


The arrival of quantum computing, like nuclear fusion, is one of those things that always seems predicted to be a decade or more away, but the issue of quantum cryptography is on the doorstep now.
While quantum computers have the ability to break current encryption methods at alarming speeds, The National Institute of Standards and Technology's (NIST) release of Post-Quantum Cryptography (PQC) standards throws down the gauntlet on quantum cybersecurity.
Why DevOps teams are shifting to platform engineering [Q&A]


Software development has become increasingly demanding in recent years often driven by underlying infrastructure complexities.
This is leading some organizations to shift towards dedicated platform engineering teams. These can help by automating repetitive tasks, enhancing security protocols, and providing seamless integration across diverse systems. This in turn enables developers to focus on their core role of building applications.
Are biometrics the future for security? [Q&A]


As technology has become a key part of more areas of our lives, ensuring our information remains secure is essential. The majority of data breaches are due to credentials that have been compromised in some way so we really need to look beyond passwords.
Biometrics is one area that's gaining in popularity so we spoke to Tina D'Agostin, CEO of biometric access control specialist Alcatraz AI, to discuss the rising popularity of AI-powered biometric security solutions, and its benefits.
How AI is set to democratize information [Q&A]


One of the features of AI is its ability to process large volumes of data to identify patterns and make information more accessible.
We spoke to Igor Jablokov, CEO and founder of Pryon, about how enterprises can take advantage of this ability and make better use of their data.
Will AI transform how we secure APIs? [Q&A]


Digital services, including Generative AI, rely heavily upon Application Programming Interfaces (APIs) to access and relay data. But securing these conduits can be difficult so is this a problem that AI could help solve?
We spoke to James Sherlow, systems engineering director, EMEA, at Cequence Security, to find out how Generative AI might be used to address API security.
Software supply chain attacks and how to deal with them [Q&A]


Software supply chain attacks have increasingly made the headlines in recent years. They occur when attackers change the code in third-party software components in order to compromise the applications using them.
These attacks can be used to steal data, corrupt systems or move laterally through networks. We spoke to Ansh Patnaik, chief product officer at CyCognito, to learn more about this type of attack and how to combat it.
The CEO's digital playbook for 2025 [Q&A]


As we head towards the end of the year, the pace of challenges posed by technologies like AI shows no signs of letting up.
So what should CEOs be doing to ensure that their workforces are equipped to deal with the changes and ensure that their business remains competitive? We spoke to Mike Lee, general manager at AND Digital, to find out.
Why it's critical to secure your APIs [Q&A]


APIs are essential to the smooth running of the internet, allowing the seamless transfer of information between applications and services.
Of course all of this happens behind the scenes but that's not to say that APIs should be ‘out of sight out of mind'. We spoke to Mayur Upadhyaya, CEO at APIContext, to learn more about API Security and the importance of APIs in general.
Cyberrisk quantification and how to measure it [Q&A]


Enterprises face an increasing range of cybersecurity risk, but quantifying and managing those risks can be a difficult task.
Recent Gartner research shows that more companies are trying to roll out cyber risk quantification (CRQ) in order to get a greater understanding of their risk profile.
Why safe use of GenAI requires a new approach to unstructured data management [Q&A]


Large language models generally train on unstructured data such as text and media. But most enterprise data security strategies are designed around structured data (data organized in traditional databases or formal schemas).
The use of unstructured data in GenAI introduces new challenges for governance, privacy and security that these traditional approaches aren't equipped to handle.
Evaluating LLM safety, bias and accuracy [Q&A]


Large language models (LLMs) are making their way into more and more areas of our lives. But although they're improving all the time they're still far from perfect and can produce some unpredictable results.
We spoke to CEO of Patronus AI Anand Kannappan to discuss how businesses can adopt LLMs safely and avoid the pitfalls.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.