Why it's time for a reset of security metrics [Q&A]


Historically, security metrics have focused on measuring how many attacks are successful and how long it takes for a successful attack to be detected. This is perhaps unsurprising since the bulk of the industry has focused on building tools to detect adversaries.
We spoke to Nicko van Someren, chief technology officer at Absolute Security, to learn why companies focusing purely on defense can create more risk for their organizations, and why instead of focusing on 'time to detection,' it's time to reset security metrics to focus on 'time to recovery.'
How useful is GenAI in software development? [Q&A]


Generative AI (GenAI) holds a lot of promise for software developers: an ability to help them ship code faster, improve productivity, and reduce time spent on menial and repetitive tasks. But how much of that promise are GenAI coding tools actually delivering -- and how much is hype?
We spoke with Matt Hoffman, product manager and data analyst at Uplevel, an engineering intelligence platform that uses data from across developer tools and collaboration platforms to help engineering leaders drive organizational improvements. Uplevel's data science team, Uplevel Data Labs, recently studied the impact of Copilot usage on developer productivity.
Managing the shift to machine-to-machine communication [Q&A]


As AI continues to evolve, it will enable machines to communicate in new, dynamic, autonomous ways without human intervention.
This machine-to-machine growth has a huge potential to impact industries from smart factories to energy. We spoke to John Kim, CEO of API communication specialist Sendbird, to discuss these changes and how they will affect business.
The crucial role of data pipelines in building strong GenAI apps [Q&A]


For GenAI to live up to its promise reliable flow of data is key. AI models are only as good as the data pipeline connections bringing in quality data.
Outdated connections mean more hallucinations and untrustworthy results with data engineers hopelessly trying to manually integrate hundreds of AI data feeds. We spoke to Rivery co-founder and CEO Itamar Ben Hemo to discuss why good data pipelines are key to success.
Cyber exposure management in today's enterprise landscape [Q&A]


The cybersecurity landscape is more complex than ever and that means enterprises need to have a real-time picture of their exposure.
We spoke to Nadir Izrael, CTO and co-founder of Armis, to learn what this should look like and how security teams can evaluate and evolve their security programs to achieve more control over their asset landscape.
Addressing AI challenges for the enterprise [Q&A]


With more and more businesses keen to benefit from the possibilities that AI offers it seems like everyone is jumping on the bandwagon. But this raises a number of implementation and management challenges, especially now as enterprise AI workloads begin to scale.
We spoke to Tzvika Zaiffer, solutions director at Spot by NetApp, to discuss how these challenges can be addressed and the best practices that are emerging to ensure that implementations go smoothly.
How RISC-V standards are changing the world [Q&A]


You may have heard of RISC-V -- usually pronounced 'risk-five' -- it's an instruction set architecture originally designed to support computer architecture research and education but which has evolved to become a standard open architecture for industry.
We spoke to Calista Redmond, CEO of standards body RISC-V International to find out more about the latest developments.
The future of facilities management software [Q&A]


The facilities management sector is in the midst of a digital evolution, driven by trends such as sustainability and smart buildings, and there are also increased regulatory demands in the mix.
We spoke to Phil Meyers, CEO of mpro5, to discuss what this means for facilities management software providers.
How enterprises can maximize the value of automation [Q&A]


The idea of automating processes has of course been around since the industrial revolution. But even though we've moved on from the Spinning Jenny to artificial intelligence, automation has lost none of its importance.
So how can enterprises ensure that get the most from their automation in today’s complex world? Devin Gharibian-Saki, SVP of strategic automation at Redwood Software, believes that part of the key is to have an automation fabric. We talked to him to learn more.
The challenge of encrypted traffic for network defenders [Q&A]


When it comes to protecting sensitive information like financial data, personal information, and intellectual property, encryption has become a must. By scrambling data through the use of algorithms, only those with access to decryption keys are able to read what's being secured.
Encrypted traffic has fulfilled its intended mission: to lock down data. But, could it simultaneously be helping bad actors slip by undetected? And could encrypted traffic actually make it harder for network defenders to spot threats before it's too late?
Mitigating third-party risk in today's cyber ecosystem [Q&A]


As third-party risk continues to be a critical concern for enterprises, the need for effective risk management strategies has never been more pressing.
We spoke with Bob Maley, CISO of third-party risk management specialist Black Kite, to get his insights into effective strategies for managing this challenge along with the nuanced risks and necessary tactics to secure enterprise environments against sophisticated threats.
AI degradation -- what is it and how do we address it? [Q&A]


Many in the industry believe that AI is degrading because it's being starved of human-generated data. This leads to models being trained on the output of older models which increases the risk of hallucinations and errors.
But how big an issue is this and what can we do to fix it? We spoke to Persona CEO and co-founder, Rick Song to find out.
Why businesses need to start transitioning to post-quantum cryptography now [Q&A]


The arrival of quantum computing, like nuclear fusion, is one of those things that always seems predicted to be a decade or more away, but the issue of quantum cryptography is on the doorstep now.
While quantum computers have the ability to break current encryption methods at alarming speeds, The National Institute of Standards and Technology's (NIST) release of Post-Quantum Cryptography (PQC) standards throws down the gauntlet on quantum cybersecurity.
Why DevOps teams are shifting to platform engineering [Q&A]


Software development has become increasingly demanding in recent years often driven by underlying infrastructure complexities.
This is leading some organizations to shift towards dedicated platform engineering teams. These can help by automating repetitive tasks, enhancing security protocols, and providing seamless integration across diverse systems. This in turn enables developers to focus on their core role of building applications.
Are biometrics the future for security? [Q&A]


As technology has become a key part of more areas of our lives, ensuring our information remains secure is essential. The majority of data breaches are due to credentials that have been compromised in some way so we really need to look beyond passwords.
Biometrics is one area that's gaining in popularity so we spoke to Tina D'Agostin, CEO of biometric access control specialist Alcatraz AI, to discuss the rising popularity of AI-powered biometric security solutions, and its benefits.
Recent Headlines
Most Commented Stories
Betanews Is Growing Alongside You
Only a fool still uses Windows 7
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.